Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Appearance settings
View spothound's full-sized avatar
🐧
🐧 📦
🐧
🐧 📦
  • Preply.com
  • Málaga, Andalucia, Spain

Block or report spothound

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
spothound/README.md

visitors

Pinned Loading

  1. exploit-conditional_blind_sqlinjection exploit-conditional_blind_sqlinjection Public

    This simple Python script can be used to exploit a blind sql injection vulnerability described in this portswingger lab https://portswigger.net/web-security/sql-injection/blind/lab-conditional-resp…

    Python

  2. cicd_example cicd_example Public

    An example of implementation of a CICD pipeline for a web service.

    Groovy

  3. ThePawnsJourney ThePawnsJourney Public

    A frontend application to practice chess tactics by solving puzzles.

    Vue 7 2

Morty Proxy This is a proxified and sanitized view of the page, visit original site.