Skip to content
You must be logged in to sponsor noraj

Become a sponsor to Alexandre ZANNI

noraj is my CTF and hacker pseudo.

I'm a Cybersecurity engineer, security auditor, pentester and ethical hacker.

Also I'm a developer of BlackArch Linux.

I'm OSCP & OSWE certified.

I'm an active maintainer of the BlackArch Linux distribution, I create my own tools & contribute to various FLOSS (Free, Libre and Open Source Software) projects.

I'm top contributor at RubyFu and PayloadsAllTheThings projects. I also tend to contribute to

My github stats

My github stats

Ryo-ma's github trophy

GitHub Streak

Github langs

@noraj

A small symbolic reward for my time spent maintaining tools & contributing to various FLOSS projects. I can also help package new tools to BlackArch.

Current sponsors 1

@mxrch
Past sponsors 2
Private Sponsor
@reconmap

Featured work

  1. BlackArch/blackarch

    An ArchLinux based distribution for penetration testers and security researchers.

    Shell 2,835
  2. noraj/OSCP-Exam-Report-Template-Markdown

    πŸ“™ Markdown Templates for Offensive Security OSCP, OSWE, OSCE, OSEE, OSWP exam report

    Ruby 3,563
  3. noraj/rawsec-cybersecurity-inventory

    An inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.

    Pug 268
  4. noraj/haiti

    πŸ”‘ Hash type identifier (CLI & lib)

    Ruby 804
  5. noraj/ctf-party

    🚩 A CLI tool & library to enhance and speed up script/exploit writing with string conversion/manipulation.

    Ruby 80
  6. noraj/firefox-extension-arch-search

    A set of Web Extensions that adds ArchLinux (bug tracker, forum, packages, wiki, AUR) as a search engine to the Firefox browser.

    Shell 34

4% towards $50 per month goal

@mxrch

mxrch sponsors this goal

Select a tier

$ one time

Choose a custom amount.

$500 one time

Select

This is the amount you would pay for a Low severity (P4) vulnerability in a Bug Bounty Program.

Compensations:

  • Linkedin post and tweet to thank you (1 time)

$1,000 one time

Select

This is the amount you would pay for a Medium severity (P3) vulnerability in a Bug Bounty Program.

Compensations:

  • Linkedin post and tweet to thank you (2 times)

$2,000 one time

Select

This is the amount you would pay for a High severity (P2) vulnerability in a Bug Bounty Program.

Compensations:

  • Linkedin post and tweet to thank you (3 times)
  • Logo or/and name on the sponsor section of a project README of your choice

$5,000 one time

Select

This is the amount you would pay for a Critical severity (P1) vulnerability in a Bug Bounty Program.

Compensations:

  • Linkedin post and tweet to thank you (4 times)
  • Logo or/and name on the sponsor section of a project README of your choice
  • Company description on the sponsor section of a project README of your choice
  • Direct communication channel with me