Skip to content
View cowbe0x004's full-sized avatar

Block or report cowbe0x004

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
cowbe0x004/README.md

✨✨✨ I'm Andrew, nice to meet you! ✨✨✨


  • 📖 I’m currently working on threat hunting
  • 📘 I’m currently learning everything 🤣
  • 🎭 I’m looking to explore purple teaming
  • ☑️ 2025 Goals: learn more about Azure, KQL

🤝🏽 Connect with me:

cowbe0x004 | Mastodon cowbe0x004 | Bluesky cowbe0x004 | LinkedIn


📺 Security related Youtube videos

⭐ Starred Github repos

Latest bluesky posts

blogs.microsoft.com/on-the-issue....](https://bsky.app/profile/campuscodi.risky.biz/post/3lbhy735iws2v)

Post-Exploitation toolset github.com/d...](https://bsky.app/profile/bhinfosecurity.bsky.social/post/3lbfxa6yte22c)

🐦 Latest tweets and retweets


Sign My Guestbook

Pinned Loading

  1. sysmon-auto-install sysmon-auto-install Public

    Install and auto update scripts for sysmon and winlogbeat

    Batchfile 3 3

  2. eximrce-CVE-2019-10149 eximrce-CVE-2019-10149 Public

    simple python socket connection to test if exim is vulnerable to CVE-2019-10149. The payload simply touch a file in /tmp/eximrce.

    Shell 13 13

  3. phishnet phishnet Public

    Python 1

  4. dionaea-stats dionaea-stats Public

    Python

  5. project1 project1 Public