Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Appearance settings
View Sicks3c's full-sized avatar
🏠
Working from home
🏠
Working from home

Block or report Sicks3c

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Sicks3c/README.md

Hi there, I'm Ayoub - aka [sicksec] 👋

Twitter Follow

I'm a Hacker, Bug Bounty Hunter, and Gamer!!

  • 🌱 I’m currently learning everything 🤣
  • 👯 I’m looking to collaborate with other Hackers around the world
  • 🥅 2020 Goals: Contribute more to Open Source projects / Secure more websites
  • ⚡ Fun fact: I love to play guitar

Connect with me:

codeSTACKr | Twitter codeSTACKr | LinkedIn codeSTACKr | Instagram


Popular repositories Loading

  1. Reconizer Reconizer Public

    Shell 38 7

  2. newindex.github.io newindex.github.io Public

    HTML 3 1

  3. security-research-pocs security-research-pocs Public

    Forked from google/security-research-pocs

    Proof-of-concept codes created as part of security research done by Google Security Team.

    C++ 1 1

  4. JSScanner JSScanner Public

    Forked from dark-warlord14/JSScanner

    You can read the writeup on this script here

    Shell 1

  5. BBHTv2 BBHTv2 Public

    Forked from Kaulanab/BBHTv2

    A single script for all the tools you need for bug bounty

    Shell 1

  6. First-Book First-Book Public

    Learn Python the Hardway

    Python

Morty Proxy This is a proxified and sanitized view of the page, visit original site.