Skip to content
You must be logged in to sponsor ly4k

Become a sponsor to Oliver Lyak

@ly4k

Oliver Lyak

ly4k
Copenhagen, Denmark

Hey there, I'm Oliver Lyak, a Danish pentester and security researcher with a passion for enterprise security.

One project I'm particularly proud of is Certipy, a widely used tool for attacking and auditing Active Directory Certificate Services. Additionally, I've had the opportunity to discover and report various vulnerabilities in Windows and Active Directory to Microsoft. You can read more about my research here.

Currently, I'm developing a new tool with a GUI specifically designed for pentesters taking on Azure. My dream is to make it the go-to tool in its category. User experience is a big deal to me, and I want to create a tool that's easy to use, intuitive, and enjoyable for everyone who uses it.

By sponsoring me, you'll help me invest more time into developing open-source tools and cover the costs involved in my research and development journey, such as CI/CD, licenses, subscriptions, and all that good stuff.

The community's support, whether through financial contributions or otherwise, is what drives and inspires me to keep pushing forward in my research and development endeavors. However, the costs associated with development and research can be quite significant.

I value your feedback and suggestions, so please don't hesitate to request new features or even propose ideas for new tools.

Current sponsors 1

@mxrch
Past sponsors 2
@fgeek
@itgramabi

Featured work

  1. fortra/impacket

    Impacket is a collection of Python classes for working with network protocols.

    Python 13,740
  2. ly4k/Certipy

    Tool for Active Directory Certificate Services enumeration and abuse

    Python 2,493
  3. ly4k/CurveBall

    PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll)

    Ruby 886
  4. ly4k/PwnKit

    Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation

  5. ly4k/SpoolFool

    Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)

    C# 777
  6. ly4k/PassTheChallenge

    Recovering NTLM hashes from Credential Guard

    C 331

Select a tier

$ one time

A Public Sponsor achievement will be added to your profile.

$50 one time

Select

The Local Administrator

You've successfully used one of my tools to escalate your privileges in an engagement, exam, or CTF. Congratulations on your accomplishment, and I sincerely appreciate your support!

Perks

  • Earn a mention in our next Release notes

$150 one time

Select

The Domain Administrator

You have successfully employed one of my tools to escalate your privileges to the domain administrator level in an engagement, exam, or CTF. Congratulations on your remarkable achievement, and please accept my sincere appreciation for your valuable support!

Perks

  • Earn a mention in our Release notes
  • Earn a mention in our Release notes for every revision in a minor release

$250 one time

Select

The Enterprise Administrator

You have triumphantly utilized one of my tools to conquer an entire organization in an engagement, exam, or CTF. I'm absolutely thrilled and delighted by your outstanding achievement! Congratulations on this remarkable feat, and please accept my heartfelt gratitude for your invaluable support!

Perks

  • Earn a mention in our Release notes
  • Earn a mention in our Release notes for every revision in a minor release
  • Earn a mention in our Release notes for every minor update
  • Earn a mention in our Release notes for the next major update