Skip to content
View 0xCyberBerserker's full-sized avatar

Block or report 0xCyberBerserker

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
0xCyberBerserker/README.md

Hello there! 👋

Welcome to my repository list! Waving hand

I've worked as a Level 2 Security Analyst, Developer, and DevOps, and this is my contribution to society. I hope you find something useful here!


Profile Views

💻  Languages and Tools :

⚙ Operative Systems

Linux  Debian  CentOS  Windows  MacOS  Raspberry Pi 

⌨ Langs

Python 3  Bash    PHP  JavaScript  HTML5  Bootstrap  CSS3  MarkDown 

🛠 Tools

Docker  Kubernetes  Vim  VsCode  Git  GitHub  GitLab  BitBucket  InkScape  Apache  MySQL  Jira  Gimp  Photoshop  Wordpress  Trello 

👽 Technical Knowledge

👾 Pentesting Tools:

  • Information Gathering:
    • Nmap, Google Dorking, Nslookup
  • Vulnerability analysis:
    • Nikto, Nmap Scripts, Burp Suite Community, Exploit-DB to search for CVEs.
  • Exploitation:
    • Beef, SQLMap, Metasploit Framework, SET Toolkit
  • Post Explotation & Privilege Escalation:
    • LinPeass, WinPeass, NetCat
  • OSINT Tools:
    • OSINTgram, CloudEnum, Google Dorking, The Harvester

🕸 Networking:

  • UFW / IPTables, Azure Sentinel, Cortex XDR, Imperva WAF, IBM QRadar, WireShark

🦠 Malware Development

🔍 Skills in Progress:

  • Understanding Windows API: Learning the intricacies of the Windows API for process and memory management.
  • Process Manipulation: Gaining skills in creating, injecting, and modifying processes.
  • Memory Management: Studying techniques for accessing and manipulating memory safely and effectively.
  • Hardware Access: Exploring methods for interacting with hardware devices (keyboard, mouse, webcam, microphone).
  • Hooking Techniques: Implementing hooks to intercept and manipulate system calls for keylogging and other purposes.
  • Evasion Techniques: Learning about strategies to evade EDRs (Endpoint Detection and Response) and AV (Antivirus) engines.
  • Network Communications: Understanding how to handle unencrypted communications and implement covert channels.
  • Creative Obfuscation: Focusing on unique obfuscation techniques for Golang code, particularly for data structures and maps.
  • Runtime Generation: Developing functions that generate critical data at runtime, based on dynamic inputs and transformations.
  • Zero-Click Exploits: Working towards the goal of creating sophisticated zero-click exploits.

Pinned Loading

  1. paginaSantuarioDana paginaSantuarioDana Public

    A website built to support the Santuario Dana Tagoro, a sanctuary dedicated to rescuing and caring for animals affected by the Dana disaster in Valencia, Spain.

    HTML 3

  2. searchmeajobBot searchmeajobBot Public

    Just a test of a linkedin job search bot that applies on easy applications.

    Python 1

  3. Tor-AttackTools Tor-AttackTools Public

    A Dockerized penetration testing environment with Kali Linux, ProxyChains, and Tor. Includes tools like Nmap, Metasploit, Nikto, and FFUF to perform anonymous network reconnaissance and scanning th…

    Shell 1

  4. GoKeylogger GoKeylogger Public

    Keyloggy tool

    Go 1