Skip to content
View user70616E6461's full-sized avatar

Block or report user70616E6461

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
user70616E6461/README.md
██████╗  █████╗ ███╗   ██╗██████╗  █████╗
██╔══██╗██╔══██╗████╗  ██║██╔══██╗██╔══██╗
██████╔╝███████║██╔██╗ ██║██║  ██║███████║
██╔═══╝ ██╔══██║██║╚██╗██║██║  ██║██╔══██║
██║     ██║  ██║██║ ╚████║██████╔╝██║  ██║
╚═╝     ╚═╝  ╚═╝╚═╝  ╚═══╝╚═════╝ ╚═╝  ╚═╝

"If you believe your AI stack is secure — I have a few questions."


🐼 whoami

$ cat /etc/panda.conf

role:     Red Teamer & AI Security Researcher
focus:    Offensive tooling · TLS analysis · CVE intel · AI agent security
status:   Building CyberAI — AI-native pentest platform
belief:   "Completely safe" is a hypothesis, not a fact

I build tools that real pentesters use. From OOB detection and TLS fingerprinting to CVE intelligence pipelines — and now wrapping all of it with AI.


🛠 Projects

Free self-hosted Burp Collaborator alternative

Captures OOB DNS & HTTPS callbacks, stores interactions in SQLite, reassembles exfiltrated payloads. No Burp Suite Pro required.

Stack:    JavaScript · SQLite · DNS · HTTPS
Use case: SSRF · blind XXE · OOB command injection

CVE Threat Intelligence Platform — NVD API 2.0

Pulls and enriches CVE data from NVD API 2.0. Fast path from "target identified" to "known attack surface mapped".

Stack:    Python · NVD API 2.0
Use case: Recon automation · vuln mapping · pentest reporting

TLS Analyzer & XTLS Reality Configuration Tool

Probes domains for TLS 1.3 · HTTP/2 ALPN · X25519 · CDN presence. Scores candidates (IDEAL → POOR) and generates ready configs for Xray-core, sing-box, Mihomo, and NekoRay. 120+ built-in domains, multi-source discovery, web dashboard with real-time progress.

Stack:    Python · Flask · cryptography
Use case: XTLS Reality SNI selection · proxy config generation

🤖 CyberAI [IN PROGRESS]

AI-powered pentest platform

AI orchestration layer over the phantom stack. Automates recon, correlates findings from phantom-intel and phantom-grid, surfaces actionable attack paths. Multi-agent architecture — built by someone who red-teams AI, not just with it.

Stack:    Python · LLM APIs · multi-agent orchestration
Status:   Active development

The platform I'm most focused on right now.


🔴 Research

[ ACTIVE ]   CyberAI — AI-native pentest platform
[ ACTIVE ]   Multi-agent trust & safety protocol design
[ BUILDING ] Toolchain: phantom-grid → phantom-intel → reality-probe → CyberAI
[ STUDYING ] Prompt injection · agent hijacking · LLM attack surface analysis

📈 Activity

GitHub Stats

Streak


🤝 Contact

Open an issue in any repo with [CONTACT] in the title.


70616E6461panda · Red panda. Red team.

Popular repositories Loading

  1. phantom-grid phantom-grid Public

    Free Burp Collaborator alternative- OOB interaction capture (HTTP/HTTPS/DNS) with SQLite & exfil reassembly

    JavaScript

  2. phantom-intel phantom-intel Public

    CVE Threat Intelligence Platform — NVD API 2.0

    Python

  3. reality-probe reality-probe Public

    Python

  4. CyberAI CyberAI Public

    AI-powered pentest platform

    Python

  5. user70616E6461 user70616E6461 Public