Skip to content
View RajChowdhury240's full-sized avatar
💻
just another learner
💻
just another learner
  • Confidential
  • $ aws sts get-caller-identity
  • 02:06 (UTC +11:00)

Organizations

@fossasia @CTF-Team-irNoobs @metis-os

Block or report RajChowdhury240

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Rajchowdhury240/README.md

Typing SVG

  • 🔭 Senior Cloud Engineer
  • 📜 OSCP+
  • 🏴‍☠️ C2 Development & Evasions
  • 🌱 Red Teaming & CTFs in free time
image

Pinned Loading

  1. OSCP-CheatSheet OSCP-CheatSheet Public

    My OSCP Prep Sandbox!!

    Shell 179 60

  2. CTF-CheatSheet CTF-CheatSheet Public

    All About CTFs

    262 42

  3. ADCSDumper ADCSDumper Public

    An Automated tool leveraging Certipy & secretsdump.py to gain Domain Admin from Low Priv User

    Python 1

  4. PHP-8.1.0-dev-RCE PHP-8.1.0-dev-RCE Public

    PHP 8.1.0-dev RCE exploit

    Python 2

  5. tfswitch tfswitch Public

    Python Implementation of tfswitch utility to able to switch between versions of terraform on the go seamlessly

    Python 1

  6. CVE-2025-67435 CVE-2025-67435 Public

    A critical Remote Code Execution (RCE) vulnerability has been identified in PluXML CMS version 5.8.22. This vulnerability allows authenticated administrators to execute arbitrary PHP code on the we…