Skip to content
View somethingSEC's full-sized avatar

Block or report somethingSEC

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
somethingSEC/README.md

Typing SVG

Profile Views Followers Stars


Hacking GIF

name: somethingSEC
location: /home/arch/user
current_status: "Building offensive security tools"

education:
  - Self-taught PenTester
  - Offensive Security
  
interests:
  - ASN Reconnaissance
  - Network Scanning & Enumeration
  - Vulnerability Research
  - Automation & Tooling
  - Bug Bounty Hunting

operating_systems:
  primary: "Arch Linux (btw)"
  testing: ["Kali", "ParrotOS"]
  
learning_path:
  current: ["C", "Python"]
  next: ["Go"]
  future: ["Assembly", "Binary Exploitation"]

ethics: "I sometimes have them"


πŸ› οΈ Arsenal & Tech Stack

// Current Security Toolkit
const char* languages[] = {"C (learning)", "Python", "Bash", "Go (learning)"};
const char* tools[] = {"Nuclei", "Nmap", "Wireshark", "Metasploit", "Burp Suite"};
const char* environment[] = {"Neovim", "Tmux", "Ghostly", "Niri/Hyprland"};

C Python Go Bash Linux Git Vim Docker


⚑ Featured Security Projects

AsnScan 🎯

AsnScan

Python β€’ ASN Reconnaissance

Makes IP lists from ASN and runs them through Nuclei for automated vulnerability scanning

Project 2 Not done

Project 2

C β€’ Network Tools

security tool

Project 3 not done

Project 3

Python β€’ Automation

acking tool

Project 4 still not done

Project 4

C β€’ HMMM

Future project


πŸ“Š GitHub Statistics

GitHub Stats GitHub Streak

Top Languages

GitHub Trophies



🎯 Current Focus

#!/usr/bin/env python3

class HackerJourney:
    def __init__(self):
        self.current_projects = ["AsnScan", "Network Recon Tools", "Automation Scripts"]
        self.learning = ["C Programming", "Python", "Go"]
        self.next_goals = ["Binary Exploitation", "Tool Development", "POC Analysis"]
        self.hunting_on = ["HackerOne", "Bugcrowd", "Intigriti"]
        
    def daily_routine(self):
        activities = [
            "πŸ“š Study offensive security",
            "πŸ’» Build and improve security tools",
            "πŸ” Hunt for vulnerabilities",
        ]
        return activities
    
    def mantra(self):
        return "If it exists, it can be pwned. If it can be pwned, automate it."

hacker = HackerJourney()
print(hacker.mantra())

πŸ” Security & Ethics Statement

White Hat Educational Authorized

#!/bin/bash
# Hacker's Code of Ethics

cat << "EOF"
╔══════════════════════════════════════════════════════════════╗
β•‘  πŸ”’ All tools and research are intended for:                 β•‘
β•‘     β†’ "learning"                                             β•‘
β•‘     β†’ penetration testing                                    β•‘
β•‘     β†’ Responsible vulnerability disclosure                   β•‘
β•‘     β†’ Removing Dictators                                     β•‘
β•‘                                                              β•‘
β•‘  ⚠️ NEVER use these tools without GOOD reasons               β•‘
β•‘  πŸ’‘ Have Responsibility                                      β•‘
β•‘  🎯 NO SKIDS                                                 β•‘
β•šβ•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•
EOF

πŸ“« Connect With Me

GitHub

Security Quote

⚑ "I use Arch btw" ⚑
Built with πŸ’š and excessive amounts of caffeine | Powered by NeoVim
«« For "authorized" use only »»

Popular repositories Loading

  1. AsnScan AsnScan Public

    makes ip list from asn and runs it thru nuclei

    Python

  2. somethingSEC somethingSEC Public