Thanks to visit codestin.com
Credit goes to github.com

Skip to content
View jm33-m0's full-sized avatar
🎯
Focusing
🎯
Focusing

Highlights

  • Pro

Block or report jm33-m0

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
jm33-m0/README.md

Hi there 👋

I'm Jimmy Mi (jm33-ng)

Skills & Expertise

Programming Languages

  • Go, C, C#, Python, Shell

Cybersecurity

  • Offensive Security & Penetration Testing
  • Post-Exploitation Frameworks & C2 Development
  • Malware Analysis & Reverse Engineering
  • Privilege Escalation & Exploit Development
  • Red Team Operations

Technical Focus

  • Linux/Windows Security
  • Network Security & Protocol Analysis
  • System Automation & Tool Development
  • Security Research & Vulnerability Assessment

Contact me

Leave a message

Pinned Loading

  1. emp3r0r emp3r0r Public

    Self‑healing Gossip Mesh C2 with Assisted Peer Discovery, Modular Post‑Exploitation, and OPSEC‑Focused Transport

    Go 1.7k 275

  2. mec mec Public

    for mass exploiting

    Python 614 156

  3. win10-mouse-natural-scroll win10-mouse-natural-scroll Public

    Enable natural scrolling feature for a USB mouse under Windows 10/11

    PowerShell 35 7

  4. SSH-Harvester SSH-Harvester Public

    Harvest passwords automatically from OpenSSH server

    C 375 40

  5. windows-sandbox-init windows-sandbox-init Public

    Rapidly initialize Windows Sandbox for malware analysis and reverse engineering

    PowerShell 147 14

  6. go-cdn2proxy go-cdn2proxy Public

    proxy your C2 traffic through CDN using websocket

    Go 52 15