(Translated by https://www.hiragana.jp/)
devploit (Daniel Púa (devploit)) · GitHub
Skip to content
View devploit's full-sized avatar
🦊
Updating pwny.cc...
🦊
Updating pwny.cc...

Organizations

@eyeem @freepik-company @ripp3rs

Block or report devploit

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
devploit/README.md

Hey there! 🦊

Hi, I'm Daniel Púa (a.k.a. devploit) and I'm an infosec lover from Cádiz (Spain). I'm living on Malaga where I work and do my stuff. I also participate in CTFs as a hobby. My teams are ripp3rs & R3Vengers.

GIF

I'm currently working at Freepik Company as Security Tech Lead.

In addition to working and participating in CTFs I also (try to) maintain a repository of payloads that may be useful for other security researchers. You can visit it at: pwny.cc.

Also, you can follow me on:

Blog: devploit GitHub: devploit Twitter: devploit Linkedin: Daniel Púa HackTheBox: devploit HackerOne: devploit Intigriti: devploit CTFTime: devploit

📊 GitHub Stats:

View counter

🏆 GitHub Trophies:

Pinned Loading

  1. nomore403 nomore403 Public

    Tool to bypass 403/40X response codes.

    Go 1.1k 131

  2. awesome-ctf-resources awesome-ctf-resources Public

    A list of Capture The Flag (CTF) frameworks, libraries, resources and software for started/experienced CTF players 🚩

    466 65

  3. debugHunter debugHunter Public

    Discover hidden debugging parameters and uncover web application secrets

    JavaScript 230 7

  4. XORpass XORpass Public

    Encoder to bypass WAF filters using XOR operations.

    Python 250 43