Skip to content
View lawrenceamer's full-sized avatar
🎯
Focusing
🎯
Focusing

Organizations

@0xsp-SRD

Block or report lawrenceamer

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
lawrenceamer/README.md


👨🏻‍💻  Who AMI

name: Lawrence Amer 
located_in: Netherlands
current_job: Red Team / Offsec Expert 
Certifications:
  [
    "OSCP",
    "OSEP",
    "OSCE",
    "CRTO",
    "CARTE" 
  ]

fields_of_interests:
  [
    "Malware Development ",
    "Security Research ",
    "Threat Hunting",
  ]

🚀   I code to learn and enjoy the following

vscode python cLang linux git bash delphi Zig

Pinned Loading

  1. 0xsp-Mongoose 0xsp-Mongoose Public archive

    a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations and privilege escalations attacks, replicate the tactics an…

    Pascal 530 121

  2. dns-black-cat dns-black-cat Public

    Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands in shell mode over DNS protocol

    Pascal 109 20

  3. TChopper TChopper Public

    conduct lateral movement attack by leveraging unfiltered services display name to smuggle binaries as chunks into the target machine

    Pascal 49 7