Thanks to visit codestin.com
Credit goes to github.com

Skip to content
View heinricitorgau's full-sized avatar

Block or report heinricitorgau

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this userโ€™s behavior. Learn more about reporting abuse.

Report abuse
heinricitorgau/README.md

๐Ÿ‘‹ Hi, I'm Gao En-Zai

๐ŸŽ“ CSIE Student | ๐Ÿ’ป Cybersecurity & Network Defense Researcher

Hi โ€” Iโ€™m Gao En-Zai, a CSIE student researching offensive-to-defensive cybersecurity, including reproducible lab environments, C2 behavior analysis, and anonymity automation.
I build hands-on educational labs using Kali Linux and VirtualBox to help defenders detect, analyze, and mitigate common attack patterns.

โ€œThe RB19 performs average in every aspect โ€” and thatโ€™s what makes it great.โ€ โ€” Pierre Wachรฉ


Profile Views GitHub Followers GitHub Stars


๐Ÿ” Featured Project

A hands-on lab demonstrating how reverse shells and backdoors work from an attackerโ€™s view, enabling defenders to study detection and mitigation using Kali Linux.

Quick Start:

  1. Clone the repo
  2. Run setup_lab.sh in your VM
  3. Follow the guide for each lab stage

๐Ÿง  Research Focus

  • Ethical penetration testing & red-team simulation
  • Reverse shell exploitation and defense validation
  • Automated anonymity (Tor + SOCKS5 + obfs4)
  • Command-and-Control (C2) detection & behavior analysis
  • Secure coding and vulnerability patching (RailsGoat project)

โš–๏ธ Ethics & Legal Notice

All repositories and demonstrations are for educational and authorized research use only.
Never use these tools against systems you do not own or lack permission to test.
Misuse is illegal and unethical.


โš™๏ธ Tech Stack & Tools

Python ยท Bash ยท Linux (Kali, Debian, Parrot) ยท VirtualBox
Wireshark ยท GStreamer ยท dnsmasq ยท Tor ยท Apache2
fail2ban ยท auditd ยท Tripwire ยท Rails


๐ŸŒฑ Current Goals

  • Build a full educational cybersecurity series combining offense, defense, and anonymity
  • Publish open-source ethical hacking lab tutorials
  • Expand Tor-based IP rotation automation with ML-based traffic analysis

๐Ÿงฉ Side Projects & Research

  • C2 Architecture Simulation โ€” Python socket-based client/server for detection training
  • Ghost Mode 3 โ€” Automated Tor ControlPort IP rotation tool for anonymity research
  • RailsGoat Patch Analysis โ€” OWASP Top 10 web exploitation & defense demonstration
  • Fake Wi-Fi Simulation โ€” Legal phishing lab using airbase-ng, dnsmasq, and Apache2 to demonstrate fake hotspot risks and promote user awareness training.

๐Ÿ“Š GitHub stats

Gao En-Zai GitHub Stats

๐Ÿ’ป Top Languages

Top Languages

๐Ÿ”ฅ GitHub Streak

GitHub Streak


๐ŸŒ Professional Links

LinkedIn GitHub


- Tools & Frameworks

Linux Debian Kali Linux VirtualBox Python Ruby Bash Nmap (radar) Wireshark Tor Project Apache PHP SQLite Rails Git VSCode

Other (text listed): v4l-utils, scrot, auditd, lsof, syslog, netcat (nc), wget, bash, fail2ban, Tripwire, iptables, Logwatch, grep, diff, tail, Stem (Tor controller), obfs4proxy, dnsmasq, airbase-ng, post.php, logs.txt, USB wireless NIC (monitor/AP mode), Aircrack-ng


๐Ÿ“ซ Contact & Links

๐Ÿ“ Hsinchu, Taiwan
๐Ÿ“ง [email protected]
๐Ÿ”— Google Drive Portfolio
๐Ÿ™ GitHub @heinricitorgau


๐Ÿงพ License & Contribution

All repositories are released under the MIT License.

Contributions are welcome! Please follow standard open-source etiquette when submitting issues or pull requests.


๐Ÿค Support

๐ŸŽ€ Contributions, ๐Ÿ”ฅ issues, and ๐Ÿฅฎ feature requests are most welcome!

๐Ÿ’™ If you like my projects, Give them โญ and Share it with friends!

โญ โ€œBuild to understand, not to exploit.โ€

Popular repositories Loading

  1. Released-Python-programs-released Released-Python-programs-released Public

    Use to be some released Python programs released

    2 2

  2. Offense-to-Defense-A-Kali-Linux-Guide-to-Reverse-Shells-and-Backdoors Offense-to-Defense-A-Kali-Linux-Guide-to-Reverse-Shells-and-Backdoors Public

    Demonstrates a full penetration workflow on a lab target: scanning, exploitation, reverse shell establishment, privilege escalation, and defensive validation.

    Shell 1

  3. heinricitorgau heinricitorgau Public

  4. Implementation-of-Fake-Wi-Fi-Hotspot-and-Phishing-Login-Page-Attack Implementation-of-Fake-Wi-Fi-Hotspot-and-Phishing-Login-Page-Attack Public

    Simulates a rogue Wi-Fi access point and a phishing login portal in an isolated lab to demonstrate credential-theft risks and to teach user awareness.

    HTML

  5. Development-of-a-Dynamic-Identity-Hiding-System-Combining-Tor-and-SOCKS5-Proxy Development-of-a-Dynamic-Identity-Hiding-System-Combining-Tor-and-SOCKS5-Proxy Public

    Demonstrates a full penetration workflow on a lab target: scanning, exploitation, reverse shell establishment, privilege escalation, and defensive validation.

    Python

  6. Experimental-C2-Architecture-and-Cyber-Defense-Analysis Experimental-C2-Architecture-and-Cyber-Defense-Analysis Public

    Builds a simplified Command & Control (C2) prototype to study remote command execution and file transfer patterns, while exploring detection strategies from a defensive perspective.

    Python