Skip to content
View thw01f's full-sized avatar

Highlights

  • Pro

Organizations

@DarkLead-Hub

Block or report thw01f

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this userโ€™s behavior. Learn more about reporting abuse.

Report abuse
thw01f/README.md
w01f Banner

Hi โ€” Iโ€™m w01f ๐Ÿ‘‹

Aspiring pentester | Preparing for OSCP | Offensive security & red-team practice

๐Ÿ’€ cat /etc/About_me.conf

Terminal Stats
[MISSION_OBJECTIVE]
Target       = "Professional Penetration Tester"
Certification= "OSCP (Offensive Security Certified Professional)"
Status       = "Escalating Privileges..."

[ATTACK_VECTORS]
Focus_01     = "Penetration Testing"
Focus_02     = "Privilege Escalation (Linux/Windows)"
Focus_03     = "Malware Analysis"
Focus_04     = "Exploit Development"

[TRAINING_PROTOCOL]
Environment  = ["THM Labs (Active)", "PWK Labs", "HackTheBox (Active)", "VulnHub"]
Routine      = "Daily Learning && Writeup Analysis"
Logs         = "Check /notes directory"



w01f@mad:~$ ./whoami


# SYSTEM DIAGNOSTICS 
# ------------------
User        : w01f
Machine     : mad (Laptop)
Role        : Offensive Security Student / Pentester
Target      : OSCP Certification & VAPT
Current_Loc : IN
class Profile:
    def __init__(self):
        self.username = "w01f"
        self.languages = ["Python", "Bash"]
        self.tools = ["***"]
        
    def current_research(self):
        return [
            "OSCP",
            "Pentester",
            "Malware Analysis",
            "Memory Forensics"
        ]

    def status(self):
        return "Compiling knowledge... please wait."

Mission Log

Protocol Description Status
Pentester OSCP learner. IN_PROGRESS
Mal Analysis Learning mal learning modules. IN_PROGRESS
Forensics_AI Researching fileless malware detection using AI. IN_PROGRESS

My Status Graph

Contribution Graph

Pinned Loading

  1. flare-vm flare-vm Public

    Forked from mandiant/flare-vm

    FLARE-VM [FireEye Labs Advanced Reverse Engineering] A specialized Windows-based security distribution providing a collection of specialized tools for reverse engineers, malware analysts, incident โ€ฆ

    PowerShell 1

  2. DarkLead-OS DarkLead-OS Public

  3. DarkLead DarkLead Public

  4. Ecdysis Ecdysis Public

    Ecdysis Environment

  5. lkrg lkrg Public