Skip to content
View Vulnpire's full-sized avatar
👾
../../../../../$(echo ${USER:0:2}.$(uname -n | cut -c1-4).127.0.0.1 | base64)
👾
../../../../../$(echo ${USER:0:2}.$(uname -n | cut -c1-4).127.0.0.1 | base64)
  • Turkey

Block or report Vulnpire

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Vulnpire/README.md

Hi there!

I am Vulnpire – a passionate Red Teamer, Bounty Hunter, and Tool Developer. My mission is: explore the unexplored, disrupt the norm, and secure the world, one exploit at a time.

Descriptive Text


About Me

Alias: v1xtron
🛠 What I do:
    Passionate about building tools for reconnaissance, exploitation, and post-exploitation
    Enjoy bug bounties—research and articles are my Netflix
    Participate in CTFs during my free time
🧠 Currently learning: Everything
📫 Contact me: ones.and.zeroes.1@proton.me
🕶️ Role:
    Red/Blue Teamer, Bounty Hunter, Open-Source Whizz
♟️ Interests & Expertise:
      Web Application Pentesting & Development
      Mass Exploitation & Advanced Threat Simulation
      OSINT & Digital Forensics
      Strategic Adversarial Techniques
      Reversing & Exploit Development for Legacy and Modern Systems
      Tool-Building for Offensive Security
      Malware Development & Analysis
      Linux & DevSecOps

🧩 Skills & Toolbox

Vulnerability Research: RCE, XSS, SQLi, SSRF, CSRF, CORS, IOT, WEB-CACHE, SSTI, XXE, JWT, IDOR, BUSINESS LOGIC
Exploit Development: Buffer Overflows, LPEs, AD Persistence
Programming: Go, Python, Bash for Recon and Exploitation
Red Teaming: API, Web, Network Pentesting, Social Engineering, OSINT, Reconnaissance
DevSecOps: Regex Workflows, Secure Code Audits
GoLang AWS Bash PyTorch Flask Apache Burp Suite RedHat Amazon DynamoDB MySQL Python Ruby JavaScript Assembly Kali Linux Wireshark Metasploit Ansible Powershell Django DigitalOcean Linode Azure GCP BSD Arch Linux Raspberry Pi Ubuntu Docker Cisco Radare2 Ghidra Frida DnSpy

🚀 I'm currently working on

👁️ Phantom Sight: Automation for mass-scale vulnerability discovery and exploitation across the web (SaaS) - Demo Soon!
🎯 Banshee: Yet another* Google dorking tool with anti-bot bypass - Demo - Will Be Released Soon!

Exploit the unknown. Fortify the known.

Pinned Loading

  1. Arsenal Arsenal Public

    Collection of tools, scripts, one-liners, templates, dorks and more

    Shell 6 2

  2. bounty-search-engine bounty-search-engine Public

    This search engine automates the discovery of sensitive information using customized dorks across GitHub, Google, and Shodan.

    JavaScript 11 3

  3. SSL-Hunter SSL-Hunter Public

    Python script for storing and querying SSL scan results and cloud IP ranges in MongoDB. Utilizes Flask for flexible API endpoints.

    Python 5

  4. wayfuzz wayfuzz Public

    Generate concise and targeted wordlists from Wayback Machine URLs

    Go 1

  5. sXtract sXtract Public

    Fetch IP addresses from Shodan search results.

    Go 1

  6. cXtract cXtract Public

    Extracts hidden subdomains and IPs from cloud data

    Go