Skip to content
View tibane0's full-sized avatar

Block or report tibane0

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 250 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
tibane0/README.md

Hello World

🔹 IT student passionate about binary exploitation, reverse engineering, malware development and low-level systems development | CTF player.
🔹 Aspiring Vulnerability Researcher and Exploit Developer.
🔹 Currently learning binary exploitation techniques and diving into kernel development & exploitation.


BLOG


Featured Projects

  • TibaneC2 → A custom red team Command & Control (C2) framework
    • Status: Under active development
  • Binary Exploitation CTF Writeups - Writeups and solutions for binary exploitation (pwn) ctf challenges I solved
  • Shellcode Executor/Tester - A tool to load, run and analyze raw shellcode in a controlled environment project to help me learn x86-64 assembly.
    • Status: Under active development

Languages and Tools



Pinned Loading

  1. TibaneC2 TibaneC2 Public

    A lightweight, modular Command and Control (C2) framework built for offensive security research and red teaming (Post Exploitation).

    C 57 8

  2. ctf-pwn ctf-pwn Public

    Solutions to binary exploitation (pwn) CTF challenges

    Python

  3. pwn-env pwn-env Public

    Docker environment for binary exploitation

    Dockerfile

  4. shellcode-executor shellcode-executor Public

    a shellcode executor/tester to load, run and analyze raw shellcode in a controlled environment.

    Assembly