Become a sponsor to Alexandre ZANNI
noraj is my CTF and hacker pseudo.
I'm a Cybersecurity engineer, security auditor, pentester and ethical hacker.
Also I'm a developer of BlackArch Linux.
I'm an active maintainer of the BlackArch Linux distribution, I create my own tools & contribute to various FLOSS (Free, Libre and Open Source Software) projects.
I'm top contributor at RubyFu and PayloadsAllTheThings projects. I also tend to contribute to
- HackTricks,
- retire.js,
- SecLists,
- ProjectDiscovery Chaos,
- SecCertRoadmap,
- Public penetration testing reports
- The Ruby Toolbox
- and many other security related FLOSS knowledge base.
Featured work
-
BlackArch/blackarch
An ArchLinux based distribution for penetration testers and security researchers.
Shell 2,835 -
noraj/OSCP-Exam-Report-Template-Markdown
π Markdown Templates for Offensive Security OSCP, OSWE, OSCE, OSEE, OSWP exam report
Ruby 3,563 -
noraj/rawsec-cybersecurity-inventory
An inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.
Pug 268 -
noraj/haiti
π Hash type identifier (CLI & lib)
Ruby 804 -
noraj/ctf-party
π© A CLI tool & library to enhance and speed up script/exploit writing with string conversion/manipulation.
Ruby 80 -
noraj/firefox-extension-arch-search
A set of Web Extensions that adds ArchLinux (bug tracker, forum, packages, wiki, AUR) as a search engine to the Firefox browser.
Shell 34
$500 one time
SelectThis is the amount you would pay for a Low severity (P4) vulnerability in a Bug Bounty Program.
Compensations:
- Linkedin post and tweet to thank you (1 time)
$1,000 one time
SelectThis is the amount you would pay for a Medium severity (P3) vulnerability in a Bug Bounty Program.
Compensations:
- Linkedin post and tweet to thank you (2 times)
$2,000 one time
SelectThis is the amount you would pay for a High severity (P2) vulnerability in a Bug Bounty Program.
Compensations:
- Linkedin post and tweet to thank you (3 times)
- Logo or/and name on the sponsor section of a project README of your choice
$5,000 one time
SelectThis is the amount you would pay for a Critical severity (P1) vulnerability in a Bug Bounty Program.
Compensations:
- Linkedin post and tweet to thank you (4 times)
- Logo or/and name on the sponsor section of a project README of your choice
- Company description on the sponsor section of a project README of your choice
- Direct communication channel with me