Thanks to visit codestin.com
Credit goes to github.com

Skip to content
View N111X's full-sized avatar

Block or report N111X

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
N111X/README.md
title min max close

C:\WINNT\System32> whoami /all
USER INFORMATION
----------------
Role: Malware Engineer Β· Binary Archaeologist Β· Exploit Developer
Clearance: LOW-LEVEL ACCESS | RING 0 PRIVILEGES | KERNEL MODE

C:\WINNT\System32> type motd.txt "Good malware doesn't hideβ€”it just belongs." Every executable is a blackbox waiting to be opened. AV signatures are just opinions about your shellcode. The stack never lies. The heap always betrays you.


boot sequence





βš” ATTACK SURFACE MAP

🦠 MALWARE DEVELOPMENT & ANALYSIS

β”œβ”€ Process Injection (DLL, Shellcode, Reflective)
β”œβ”€ AMSI/ETW Bypass (patch, unhook, inline)
β”œβ”€ Syscall Direct (Hell's Gate, Halo's Gate)
β”œβ”€ Obfuscation (control flow, string encryption)
β”œβ”€ Persistence (Registry, Scheduled Tasks, WMI)
β”œβ”€ AV/EDR Evasion (sleep obfuscation, API hashing)
β”œβ”€ C2 Protocol Design (DNS tunneling, HTTPS)
└─ Packer/Crypter Development

πŸ’£ EXPLOIT DEVELOPMENT

β”œβ”€ Stack-based Buffer Overflow
β”œβ”€ Heap Exploitation (UAF, Double Free)
β”œβ”€ ROP Chain Construction (gadget mining)
β”œβ”€ ASLR/DEP Bypass
β”œβ”€ Kernel Exploits (privilege escalation)
β”œβ”€ Format String Vulnerabilities
β”œβ”€ Type Confusion & Integer Overflow
└─ 0-day Research & Weaponization

πŸ” REVERSE ENGINEERING

β”œβ”€ Static Analysis (IDA, Ghidra, Binary Ninja)
β”œβ”€ Dynamic Analysis (x64dbg, WinDbg, Frida)
β”œβ”€ API Hooking & Instrumentation
β”œβ”€ Anti-Debug/VM Detection Bypass
β”œβ”€ Unpacking (UPX, Themida, VMProtect)
β”œβ”€ Protocol Reverse Engineering
β”œβ”€ Firmware Extraction & Modification
└─ Patch Analysis & Diff

🏭 SCADA & ICS PENTESTING

β”œβ”€ Protocol Analysis (Modbus, DNP3, S7comm)
β”œβ”€ PLC/RTU Vulnerability Assessment
β”œβ”€ HMI Exploitation
β”œβ”€ Network Segmentation Testing
β”œβ”€ Replay & MitM Attacks
β”œβ”€ Safety System Bypass
└─ Air-Gap Infiltration Techniques

πŸ” CRYPTOGRAPHY & CRYPTANALYSIS

β”œβ”€ Classical Cipher Breaking
β”œβ”€ Side-Channel Attacks (timing, power)
β”œβ”€ Weak RNG Exploitation
β”œβ”€ Hash Collision & Extension
β”œβ”€ Protocol Weaknesses (SSL/TLS downgrade)
β”œβ”€ Key Recovery Techniques
└─ Steganography & Covert Channels

🌐 GENERAL HACKING

β”œβ”€ Web: SQLi, XSS, SSRF, RCE, XXE
β”œβ”€ Network: Protocol fuzzing, MitM
β”œβ”€ Wireless: WiFi cracking, BT/RF hacking
β”œβ”€ AD Exploitation (Kerberoasting, DCSync)
β”œβ”€ OSINT & Social Engineering
└─ Physical Security Bypass

πŸ›  ARSENAL
βš™οΈ LANGUAGES

C Β· C++ Β· Assembly Β· Go
Python Β· Java Β· Bash Β· PowerShell
πŸ’» SYSTEMS

Windows 11/10/Server
Kali Β· Arch Β· Debian Β· Ubuntu
πŸ”§ REVERSING

IDA Pro Β· Ghidra Β· x64dbg
Binary Ninja Β· radare2 Β· WinDbg
🦠 MALWARE TOOLS

dnSpy Β· PE-bear Β· Detect It Easy
Process Monitor Β· API Monitor
πŸ’₯ EXPLOITATION

pwntools Β· ROPgadget Β· msfvenom
pwndbg Β· GEF Β· Frida
🌐 NETWORK

Wireshark Β· Burp Suite Β· nmap
tcpdump Β· Netcat Β· Nessus

πŸ“‚ FEATURED PROJECTS
AutoDorks sniffer CoverTCP

πŸ“Š SYSTEM METRICS
streak stats



languages trophies



activity

πŸ“‘ ESTABLISH CONNECTION


🎡 CURRENTLY ANALYZING TO
Spotify

╔════════════════════════════════════════════════════════════════════════╗
β•‘  [0x00] Trust is a vulnerability, verify every syscall                    β•‘
β•‘  [0x01] Every security product is just software with opinions             β•‘
β•‘  [0x02] The stack tells you what happened, the heap tells you why         β•‘
β•‘  [0x03] Good malware doesn't hideβ€”it just belongs                         β•‘
β•‘  [0xFF] Reality is just undefined behavior waiting to be exploited        β•‘
β•šβ•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•

start

Popular repositories Loading

  1. sniffer sniffer Public

    Python 1

  2. CoverTCP CoverTCP Public

    C

  3. Cifrador-Vigenere Cifrador-Vigenere Public

    C

  4. N111X N111X Public

  5. AutoDorks AutoDorks Public

    Python