This repository is my offensive security hub — a collection of projects that explore the full attack chain:
- 🐞 Exploit Development → breaking in 🚪
- 🐹 Malware Development (Go) → staying in 🕵️
- 🎭 Tradecraft / Adversary Emulation → simulating real-world TTPs
⚡ Designed for red teamers, researchers, and learners who want to dive into adversary simulation, post-exploitation, and low-level offensive programming.
-
🐞 Exploit Development
🔹 Vulnerability research, memory corruption, PoCs, shellcoding -
🐹 Malware Development (Go)
🔹 Windows API, persistence, injection, evasion techniques -
🎭 Tradecraft / TTPs
🔹 MITRE ATT&CK-based adversary emulation (e.g., FIN6), red team labs -
🌐 C2 Command & Control
🔹 Adaptix C2 → A modular, lightweight C2 framework with focus on stealth and operator usability.
✔️ Build a structured red team toolkit
✔️ Document offensive security techniques
✔️ Practice realistic adversary emulation
✔️ Share knowledge for learners & professionals