Skip to content
View totekuh's full-sized avatar
  • LE POPUG
  • Germany

Block or report totekuh

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Pinned Loading

  1. snaffler-ng snaffler-ng Public

    Python port of Snaffler using Impacket

    Python 12 2

  2. winbox winbox Public

    Run Windows pentest tools transparently from Kali via headless QEMU/KVM. Includes hypervisor-level kernel debugger (EDR-invisible, hardware breakpoints by default) + MCP server (51 tools for AI age…

    Python 1

  3. CVE-2026-36355 CVE-2026-36355 Public

    CVE-2026-36355: Realtek rtl819x Jungle SDK - Unauthenticated Kernel Memory Read/Write via Debug ioctls

    C

  4. CVE-2026-36356 CVE-2026-36356 Public

    CVE-2026-36356: MeiG Smart FORGE_SLT711 GoAhead - Unauthenticated OS Command Injection (RCE as root)

    Python