bee-san - Overview

View bee-san's full-sized avatar

Autumn (Bee) bee-san

Sponsors

Block or report bee-san

Hello World

🐝 Autumn (Bee) | πŸ’» Systems Engineer @ Amazon | 🌏 Tokyo / London

About me

  • ⚑ Inventor of RustScan, Ciphey, Name-That-Hash, Search-That-Hash, and PyWhat
  • πŸŽ“ Graduate Computer Scientist with Honours from University of Liverpool
  • πŸŽ– ex-Lead Subreddit at TryHackMe, ex-top 3 player, ex-original discord mod growing it from 5k members to 300k
  • πŸ‘€ I blog random stuff here here
  • Previously at Cisco / Duo Security / Monzo

Vulnerabilities I found:

  • CVE-2024-32484 - Flask Invalid Path Reflected Cross-Site Scripting (XSS) vulnerability
  • CVE-2024-26020 - RCE MPV script injection vulnerability
  • And a couple more (CVE-2024-32152, CVE-2024-29073)

✨✨✨✨✨✨✨✨✨✨✨✨✨✨✨✨✨✨✨✨✨✨✨✨

Pinned Loading

  1. ⚑ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚑

    Python 21.3k 1.4k

  2. πŸ€– The Modern Port Scanner πŸ€–

    Rust 19.5k 1.3k

  3. 🐸 Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell you what it is! πŸ§™β€β™€οΈ

    Python 7.2k 382

  4. πŸ”ŽSearches Hash APIs to crack your hash quicklyπŸ”Ž If hash is not found, automatically pipes into HashCat⚑

    Python 1.4k 96

  5. πŸ”— Don't know what type of hash it is? Name That Hash will name that hash type! πŸ€– Identify MD5, SHA256 and 300+ other hashes β˜„ Comes with a neat web app πŸ”₯

    Python 1.6k 109

  6. Automated decoding of encrypted text without knowing the key or ciphers used

    Rust 865 46