Skip to content
View Wang-SecurityResearch's full-sized avatar
🎯
Focusing
🎯
Focusing

Block or report Wang-SecurityResearch

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚  whoami                                                   β”‚
β”‚  ───────────────────────────────────────────────────     β”‚
β”‚  > Security Researcher based in [REDACTED]               β”‚
β”‚  > Focus: Web Security / Binary Exploitation / Reverse   β”‚
β”‚  > CTF: n0xious@TeamVoid                                 β”‚
β”‚  > Bug Bounty: HackerOne / Bugcrowd                      β”‚
β”‚  > Currently: Hunting for logic flaws & memory corruptionβ”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

🧠 About Me

I'm a self-taught security researcher with a focus on offensive security, vulnerability research, and reverse engineering. I play CTFs regularly with TeamVoid and occasionally disclose bugs through responsible disclosure programs.

Most of my work lives in the intersection of low-level exploitation and web application security. When I'm not breaking things, I'm writing about how they broke.

"Security is not a product, but a process." β€” Bruce Schneier


βš”οΈ Areas of Focus

Domain Tools & Skills
🌐 Web Security Burp Suite, SQLMap, ffuf, nuclei, XSS/SSRF/IDOR
πŸ’£ Binary Exploitation pwntools, GDB-peda, ROPgadget, heap feng shui
πŸ” Reverse Engineering Ghidra, IDA Free, x64dbg, angr
πŸ•΅οΈ OSINT Shodan, theHarvester, Maltego
🐧 Privilege Escalation Linux/Windows post-exploitation, custom scripts

πŸ† CTF Highlights

2024  ── HITCON CTF          β†’ Top 5%   (Web + Pwn)
2024  ── NahamCon CTF        β†’ Top 10%  (Web + Crypto)
2023  ── picoCTF             β†’ Top 8%   (All categories)
2023  ── DEFCON CTF Quals    β†’ Qualified with TeamVoid
2023  ── HackTheBox Uni CTF  β†’ 3rd Place

πŸ› οΈ Tech Stack

Python C Bash Go Linux Docker


Popular repositories Loading

  1. jwt-pwn jwt-pwn Public

    Python 1

  2. Wang-SecurityResearch Wang-SecurityResearch Public

    1

  3. ctf_toolkit ctf_toolkit Public

    **CTF Toolkit** is a highly specialized, high-performance network analysis and evasion testing component designed for red teamers, security researchers, and CTF (Capture The Flag) competitors.

    Python 1

  4. openvpn_rce openvpn_rce Public

    openvpn_rce

    Python 1

  5. LuoDllHack LuoDllHack Public

    LuoDllHack

    Python 1

  6. Nuclei_Honeypot_Poc Nuclei_Honeypot_Poc Public

    Nuclei_Honeypot_Poc

    Python