Skip to content
View DExplo1ted's full-sized avatar

Block or report DExplo1ted

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
DExplo1ted/README.md

Welcome 👋

🛡️ Security researcher and CVE Hunter with 8+ years of experience straddling the line between offensive security and software engineering, work as a full-stack developer but my passion lies in breaking systems to understand how they truly work.

  • Reliable exploit development for high-impact CVEs (UAF, type confusion, logic flaws)
  • Malware analysis & reverse engineering (Windows/Linux, x86/x64/ARM)
  • Custom red team tooling in C++, Rust, and PowerShell
  • Program analysis using static/dynamic techniques to uncover hidden attack surfaces

🛠️ Core Skills & Tech Stack

  • Languages: C, C++, Rust, Python, C#, PowerShell, Bash, JavaScript/TypeScript, Java, PHP
  • Low-Level: x86/x64 & ARM/ARM64 assembly, Windows/Linux kernel internals
  • Exploitation: Heap grooming, ROP/JOP, SMEP/SMAP bypasses, sandbox escapes
  • RE & Debugging: IDA Pro, Ghidra, x64dbg, WinDbg, GDB, Binary Ninja
  • Malware Analysis: YARA, Cuckoo, custom unpackers, behavioral sandboxing
  • Web & ML: TensorFlow.js, adversarial ML prototyping, web-based C2 frameworks
  • Platforms: Windows (ETW, AMSI, PatchGuard), Linux (eBPF, LSM), macOS/iOS

Popular repositories Loading

  1. CVE-2025-10041-POC CVE-2025-10041-POC Public

    Unrestricted Upload of File with Dangerous Type (CWE-434)

    1

  2. DExplo1ted DExplo1ted Public