Skip to content
View Tanvexar's full-sized avatar
🎯
⚡ Solving CTFs | Learning Red Team Operations
🎯
⚡ Solving CTFs | Learning Red Team Operations

Block or report Tanvexar

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Tanvexar/README.md

👾 Tanvexar

🛡️ Red Team Learner | Security Researcher
💻 CTF Player | Exploit Enthusiast


⚡ About Me

  • 🔍 Focused on Manual Penetration Testing
  • 🧠 Practicing Offensive Security & Red Team Methodologies
  • 🏴‍☠️ Solving CTF Challenges and Vulnerability Labs
  • ⚔️ Exploring Privilege Escalation & Exploitation Techniques

🔧 Tools I Work With

  • Nmap
  • Burp Suite
  • Metasploit
  • Linux
  • Wireshark
  • Gobuster
  • Netcat

🧠 Security Focus

  • Manual Web Application Testing
  • Network Enumeration & Exploitation
  • Privilege Escalation Techniques
  • CTF Labs & Realistic Attack Scenarios

🎯 Current Goal

Becoming a Professional Red Team Operator and mastering offensive security.


🕶️ Hacker Tagline

Infiltrate | Escalate | Dominate


⚡ Alias: 0xTanvexar

Popular repositories Loading

  1. Tanvexar Tanvexar Public

    Red Team Learner | Security Research | CTF Player

  2. From-Shell-to-Root From-Shell-to-Root Public

    Practical offensive security playbook covering reverse shells, Linux privilege escalation, and real-world penetration testing techniques for beginners to intermediate learners.