Skip to content
View Razor1911OP's full-sized avatar
  • F Society
  • 20:16 (UTC +05:30)

Highlights

  • Pro

Block or report Razor1911OP

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Razor1911OP/README.md

Hi, I’m Razor1911OP 👋

Penetration tester • Offensive security enthusiast • Reverse engineer
On a mission to become the greatest (ethical) hacker—legally, transparently, and with impact.

I simulate real attacks to help defenders win. I learn in public and share what I can.


🎯 Mission & ethos

  • 🥇 Goal: Master the craft of penetration testing across web, AD, cloud, and mobile.
  • 🛡️ Ethos: Legal scope only, written permission first, responsible disclosure always.
  • 📚 Principles: Master fundamentals → build and automate → document and teach.

🧭 What I do

  • Web & API penetration testing (OWASP Top 10, business logic, auth flows)
  • External and internal network assessments (attack paths, lateral movement)
  • Active Directory and identity attacks (misconfigs, privilege escalation, pathways)
  • Cloud security reviews (enumeration, misconfig detection, least-privilege gaps)
  • Mobile app recon and analysis (traffic, storage, RE for insight)
  • Reporting that prioritizes risk, reproducibility, and clear remediation

🧰 Arsenal (tools I actually use)

  • Recon: amass, subfinder, httpx, nuclei, aquatone, Naabu
  • Web/API: Burp Suite Pro, ffuf, zap, Postman, GraphQL tooling
  • Network: Nmap, masscan, crackmapexec, Responder, Impacket, BloodHound
  • Auth/ID: Kerbrute, Rubeus, Certipy, gMSA/ADCS checks
  • Cloud: awscli, ScoutSuite, Prowler, Steampipe
  • RE/Mobile: Ghidra, JADX, Frida, Objection, radare2/rizin
  • Scripting: Python, Bash, Go; infra: Docker/Podman; OS: Linux (Kali/Arch/Ubuntu)

🧪 Methodology

  • Standards: PTES, NIST SP 800‑115, OWASP (WSTG, API, MASVS)
  • Approach: scope ➜ recon ➜ threat modeling ➜ exploitation ➜ post‑ex ➜ reporting
  • Deliverables: reproducible steps, impact analysis, prioritized fixes, retest plan

🗺️ Roadmap to “greatest hacker” (pen‑test track)

  • 0x01 Foundations
    • OS internals, networks (L2–L7), auth/SSO/OAuth/OIDC, crypto basics
    • Web deep‑dive: session mgmt, access control, deserialization, SSRF, RCE
  • 0x02 Enterprise & AD
    • Kerberos, ADCS, delegation, unconstrained/ constrained paths, LAPS/gMSA
    • Build repeatable AD lab; catalog attack chains with detections
  • 0x03 Cloud
    • AWS/IAM privilege escalation maps, common misconfigs, detection evasion
    • IaC scanning and least‑privilege playbooks
  • 0x04 Mobile/RE
    • Android instrumentation (Frida), storage/network hardening checks
    • Bytecode → behavior mapping; secure IPC and TLS pinning techniques
  • 0x05 Publish & teach
    • Monthly writeups and tooling releases with defensive guidance
    • Talks/workshops; mentor newcomers

📌 Featured projects


📒 Writeups & notes

  • Pentest/CTF writeups:
  • AD/cloud lab notes:
  • Disclosure reports (sanitized):

📈 GitHub stats

GitHub stats Top languages

Streak


🧩 How I work

  • Scope and rules of engagement first. Private reporting, coordinated disclosure.
  • Clear, reproducible findings with impact and actionable remediation.
  • Prefer typed, tested, and automated workflows; version‑controlled notes.

🎓 Learning & certifications

  • In progress:
  • Completed:
  • Planned:

🧪 Lab environment

  • Homelab:
  • Cloud sandboxes:
  • Data hygiene: isolate, resettable snapshots, no real customer data, safe payloads

🤝 Collaborate

  • Open to: pentest collabs, research, tool building, mentoring, responsible bug bounties
  • Best way to reach me:
  • Availability:

🌐 Around the web

  • Website/Portfolio:
  • Blog/Writeups:
  • LinkedIn:
  • X (Twitter):
  • Mastodon:
  • Discord:
  • Email:
  • PGP:

☕ Support

  • GitHub Sponsors:
  • Ko‑fi / Buy Me a Coffee:

Popular repositories Loading

  1. bitchat-python bitchat-python Public

    Forked from kaganisildak/bitchat-python

    expertimental

    Python

  2. dex2jar dex2jar Public

    Forked from tanuj99/dex2jar

  3. Razor1911OP Razor1911OP Public

    My personal repository

  4. GeoJitsu GeoJitsu Public

    Just ap app for smart tourism and geofencing and digital id verification through blockchain