Skip to content
View X99874's full-sized avatar
๐ŸŽฏ
Focusing
๐ŸŽฏ
Focusing
  • VirtualCyberTechnology
  • United Kingdom
  • 13:20 (UTC +01:00)

Organizations

@InternationalCyberSecurityResponseCtr

Block or report X99874

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this userโ€™s behavior. Learn more about reporting abuse.

Report abuse
X99874/README.md

I'm stronger with every line of code. Closer with every vulnerability. | ๐Ÿ›ก๏ธ CyberSecurity & Ethical Hacking

๐Ÿ‘‹ Hi, Iโ€™m @X99874

I'm a cybersecurity enthusiast with a passion for ethical hacking, digital defense, and finding vulnerabilities before the bad guys do.

With a strong commitment to safeguarding digital assets, I focus on understanding the tactics and techniques used by attackers in order to stay one step ahead.

My goal is to strengthen digital environments by anticipating and analyzing potential threats, ensuring systems remain resilient against evolving cyber attacks and emerging risks. I specialize in penetration testing, vulnerability assessment, malware analysis, and incident response, constantly refining my skills through hands-on experience and continuous learning.

Driven by curiosity and a proactive mindset, I actively participate in Capture The Flag (CTF) competitions, develop custom security challenges, and explore advanced topics such as reverse engineering and exploit development. I believe that true cybersecurity is a continuous process of learning, adapting, and innovating to protect our increasingly connected world.

๐Ÿ‘€ Areas I'm Interested In

  • ๐ŸŒ Exploring and experimenting with diverse network systems and security tools
  • ๐Ÿ”“ Conducting thorough penetration testing in Web, Network, and Wireless environments
  • ๐Ÿฆ  Diving deep into malware analysis, reverse engineering, and unpacking complex binaries
  • ๐ŸŽฏ Solving and creating Capture The Flag (CTF) challenges to enhance cybersecurity skills
  • ๐Ÿ•ต๏ธ Leveraging OSINT techniques and performing digital forensic investigations for threat intelligence
  • ๐Ÿฆ€ Developing secure and efficient systems using the Rust programming language
  • ๐Ÿ› ๏ธ Designing, building, and deploying custom CTF challenges to educate and challenge others
  • ๐Ÿ’ฅ Crafting advanced custom payloads, writing exploits, and developing proof-of-concept attacks
  • ๐Ÿ“ก Setting up and managing enterprise-grade network labs involving Cisco switches, routing, and VLANs
  • ๐Ÿ” Practicing secure coding, auditing, and vulnerability assessments in Rust, Python, Bash, and C
  • ๐Ÿ“Š Analyzing network traffic with tools like Wireshark and creating custom packet manipulations with Scapy
  • ๐Ÿณ Exploring container security with Docker and Kubernetes for modern cloud-native environments
  • โ˜๏ธ Understanding cloud security principles across platforms like AWS, Azure, and Google Cloud
  • ๐Ÿค– Automating penetration testing and security workflows through scripting and tool development
  • ๐Ÿ—„๏ธ Hands-on experience in managing databases and implementing security best practices to maintain data integrity. Skilled in configuring, maintaining and securing databases to ensure high availability and data protection
  • โšกI'm passionate about Electrical and Electronics Engineering, focusing on circuit design, sensor systems, and microcontrollers like Arduino and STM32. I enjoy building embedded and IoT projects while constantly learning and improving.

๐Ÿšง Current Focus

  • ๐ŸŒ Exploring and experimenting with diverse network systems and security tools
  • ๐Ÿฆ€ Learning Rust to build secure systems
  • ๐ŸŽฏ Creating my own CTF challenges
  • ๐Ÿ’ฅ Writing custom payloads and exploits
  • ๐Ÿ”ง Setting up and experimenting with Cisco switches and routers
  • ๐Ÿ›ข๏ธ Exploring database management and secure configurations

I'm always experimenting, breaking, fixing, and learning.

๐ŸŒฑ I'm currently learning

  • ๐Ÿฆ€ Rust for secure and efficient system programming
  • ๐Ÿ–ง Advanced Cisco networking concepts (Switching, Routing, VLANs, ACLs, QoS)
  • ๐Ÿ—„๏ธ Database management systems and best security practices (MySQL, PostgreSQL, MongoDB)
  • ๐Ÿ’ฅ Writing custom exploits, payloads, and advanced proof-of-concept attacks
  • ๐ŸŽฏ Designing and deploying custom CTF challenges for different skill levels
  • ๐Ÿ” Reverse engineering techniques, malware unpacking, and dynamic analysis
  • ๐Ÿ•ต๏ธ Threat hunting methodologies and incident response automation
  • ๐Ÿ›ฐ๏ธ OSINT (Open Source Intelligence) tools and techniques
  • ๐Ÿง‘โ€๐Ÿ’ป Digital forensics and log analysis for cyber incident investigations
  • ๐Ÿณ Container security and orchestration with Docker and Kubernetes
  • โ˜๏ธ Cloud security fundamentals (AWS, Azure, GCP)
  • ๐Ÿ” Secure coding practices in Rust, Python, Bash, and C
  • ๐Ÿค– Automation and scripting for penetration testing (Python, PowerShell, Bash)
  • ๐Ÿ“ก Network protocol analysis and packet crafting (Wireshark, Scapy)
  • ๐ŸŒ Web application security, including modern frameworks and APIs
  • ๐Ÿ“ถ Wireless security and penetration testing techniques
  • ๐Ÿ”’ Cryptography basics and practical applications in security
  • ๐Ÿงฐ Building and using custom security tools and red team utilities
  • ๐ŸŽฎ Continuous learning through CTF competitions and collaborative projects
  • ๐Ÿง  Developing skills in social engineering and human factor analysis

๐Ÿงฐ Developer Tools & Gadgets

  • ๐Ÿฌ Flipper Zero โ€“ Experimenting with RF, IR, RFID, and more
  • ๐Ÿ“ Raspberry Pi โ€“ DIY projects and edge computing
  • ๐Ÿฆ† USB Rubber Ducky โ€“ Scripting and testing HID attacks (for ethical purposes only)
  • ๐Ÿ” YubiKey โ€“ Hardware authentication token for secure login and 2FA
  • ๐Ÿ“ก HackRF One โ€“ Software-defined radio (SDR) for analyzing wireless signals
  • ๐Ÿ› ๏ธ Proxmark3 RDV4 โ€“ Advanced RFID/NFC research tool for reading/cloning tags
  • ๐Ÿ” LAN Turtle โ€“ Covert network implant for remote access and sniffing
  • ๐Ÿ”Œ Packet Squirrel โ€“ USB-powered device for packet capture and MITM attacks
  • ๐Ÿงฒ Key Grabber โ€“ Hardware keylogger (used for testing physical endpoint security)
  • ๐Ÿ”Œ USB Kill โ€“ Tests surge protection by delivering high-voltage pulses to USB ports
  • ๐ŸŽ›๏ธ WiFi Pineapple โ€“ Wireless auditing device for rogue AP detection and testing

๐Ÿ”ง Cyber Tech & Tools I Use

Python Kali Linux WSL Ubuntu Burp Suite Metasploit Framework Wireshark Nmap OWASP ZAP Cuckoo Sandbox

  • And More...

๐Ÿ’ž I'm open to collaboration on the following cybersecurity-focused topics

  • ๐Ÿงฉ We are I am open to collaboration on designing and developing secure Microsoft SQL Server databases to support the creation, deployment, and scoring of both .
  • ๐Ÿ› ๏ธ Designing and hosting CTF challenges (Jeopardy & Attack-Defense style)
  • ๐Ÿ” Real-world penetration testing scenarios (Web, Network, Wireless)
  • ๐Ÿงฌ Malware analysis, unpacking, and reverse engineering
  • ๐Ÿ›ฐ๏ธ Threat hunting, OSINT, and digital forensics investigations
  • ๐Ÿ“ก Building and simulating enterprise-grade network labs (Cisco, VLANs, Routing, Firewalls)
  • ๐Ÿงช Developing custom exploits, payloads, and proof-of-concept attacks
  • ๐Ÿ” Secure coding and auditing in Rust, Python, and Bash
  • ๐Ÿงฐ Contributing to open-source cybersecurity tools and red team utilities

๐Ÿ“ซ How to reach me

  • ๐Ÿ“ง Email:
  • ๐Ÿ’ฌ Discord: ****
  • ๐Ÿฆ X
  • ๐Ÿ’ผ LinkedIn

Popular repositories Loading

  1. X99874 X99874 Public

    Config files for my GitHub profile.