Skip to content
View 0xCyberBerserker's full-sized avatar

Block or report 0xCyberBerserker

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
0xCyberBerserker/README.md

Hello there! 👋

Welcome to my repository list! Waving hand

I've worked as a Level 2 Security Analyst, Developer, and DevOps, and this is my contribution to society. I hope you find something useful here!


Profile Views

💻  Languages and Tools :

⚙ Operative Systems

Linux  Debian  CentOS  Windows  MacOS  Raspberry Pi 

⌨ Langs

Python 3  Bash    PHP  JavaScript  HTML5  Bootstrap  CSS3  MarkDown 

🛠 Tools

Docker  Kubernetes  Vim  VsCode  Git  GitHub  GitLab  BitBucket  InkScape  Apache  MySQL  Jira  Gimp  Photoshop  Wordpress  Trello 

👽 Technical Knowledge

👾 Pentesting Tools:

  • Information Gathering:
    • Nmap, Google Dorking, Nslookup
  • Vulnerability analysis:
    • Nikto, Nmap Scripts, Burp Suite Community, Exploit-DB to search for CVEs.
  • Exploitation:
    • Beef, SQLMap, Metasploit Framework, SET Toolkit
  • Post Explotation & Privilege Escalation:
    • LinPeass, WinPeass, NetCat
  • OSINT Tools:
    • OSINTgram, CloudEnum, Google Dorking, The Harvester

🕸 Networking:

  • UFW / IPTables, Azure Sentinel, Cortex XDR, Imperva WAF, IBM QRadar, WireShark

🦠 Malware Development

🔍 Skills in Progress:

  • Understanding Windows API: Learning the intricacies of the Windows API for process and memory management.
  • Process Manipulation: Gaining skills in creating, injecting, and modifying processes.
  • Memory Management: Studying techniques for accessing and manipulating memory safely and effectively.
  • Hardware Access: Exploring methods for interacting with hardware devices (keyboard, mouse, webcam, microphone).
  • Hooking Techniques: Implementing hooks to intercept and manipulate system calls for keylogging and other purposes.
  • Evasion Techniques: Learning about strategies to evade EDRs (Endpoint Detection and Response) and AV (Antivirus) engines.
  • Network Communications: Understanding how to handle unencrypted communications and implement covert channels.
  • Creative Obfuscation: Focusing on unique obfuscation techniques for Golang code, particularly for data structures and maps.
  • Runtime Generation: Developing functions that generate critical data at runtime, based on dynamic inputs and transformations.
  • Zero-Click Exploits: Working towards the goal of creating sophisticated zero-click exploits.

Pinned Loading

  1. ScriptCollection ScriptCollection Public

    My Script Collection that makes my life easier with linux

    Shell 1

  2. terraform-aws-samples terraform-aws-samples Public

    This repository serves as a Terraform module repository, featuring a collection of ready-to-use examples curated throughout my DevOps journey. These examples provide practical demonstrations of Ter…

    HCL 1