Skip to content
You must be logged in to sponsor strikoder

Become a sponsor to $tr!k0d3r

@strikoder

$tr!k0d3r

strikoder
Berlin, Germany

Hallo zusammen, Всем привет, Hello Everyone 👋
I’m Strikoder, a cybersecurity content creator and offensive security enthusiast based in Germany.

I document my journey into penetration testing through OSCP prep, Hack The Box labs, walkthroughs, notes, and open-source security projects focused on practical offensive security learning.

Everything I share is free and will stay public. Sponsorships help me spend more time building tools, maintaining projects, and creating educational content for the cybersecurity community.

@strikoder

My goal is to continue building and sharing practical cybersecurity resources for the open-source community, including but not limited to: tools, writeups, labs, and learning material. Sponsorships help me spend more time maintaining projects and releasing new content consistently.

Featured work

  1. strikoder/OffensiveSecurity

    This repo has a collection of scripts and exploits for OSCP-style labs. It covers enumeration, exploitation, web testing, and reverse shells.

    PowerShell 20
  2. strikoder/Strikoder-OSCP-Prep

    The only OSCP preparation repository you need: notes, tooling, reporting, prep-list, methodology, and security resources.

    Shell

0% towards 5 monthly sponsors goal

Be the first to sponsor this goal!

Select a tier

$ a month

A Public Sponsor achievement will be added to your profile.

$8 a month

Select

› Access to supporter-only channels
› Name featured in YouTube supporter credits
› Influence future content, projects, and the direction of the channel

$20 a month

Select

Includes everything from the Supporter tier, plus:

› Access to Pentester-only channels
› General OSCP guidance, discussions, and methodology support
› Access to my personal pentesting notes (updated quarterly)

$40 a month

Select

Includes everything from the Pentester tier, plus:

› Access to private RedTeamer voice channels
› Watch live walkthroughs of active (easy & medium) machines and pro labs
› Follow enumeration and exploitation in real time with explanations of the attack vectors
› Get personalized feedback on methodology, notes, and overall approach
› Receive a curated OSCP improvement plan focused on your weak points (especially helpful for those who failed before)