Skip to content
View thirstypeng's full-sized avatar
🫀
<script>alert(-1)</script>
🫀
<script>alert(-1)</script>

Highlights

  • Pro

Block or report thirstypeng

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
thirstypeng/README.md

Hi 👋, I'm Yağız

A passionate Cyber Security Researcher.

  • whoami Student at Kocaeli University, Cyber Security Associate Specialist at @Privia Security & @PriviaHub and Core Team Member At GDSC Kocaeli

  • uptime 21 years

  • pwd İstanbul, Turkey

  • ps -a Golang, WebAppSec, Malware Development

Connect with me:

email linkedin twitter

Technologies I am familiar with:

devicon devicon devicon devicon devicon devicon devicon devicon devicon

Pinned Loading

  1. idorPuller idorPuller Public

    An Idor exploitation tool that can work with many different databases and also outputs as a file.

    Go 1

  2. BauthBF BauthBF Public

    Basic-auth brute force tool written in golang. It is a Useful and fast.

    Go 1

  3. hashWeb hashWeb Public

    Calculate common hashing algorithms with web application. With Go Fiber framework, you can work stably and quickly under a lot of load.

    Go 1