Skip to content
View 0xASTRA's full-sized avatar
πŸ“‘
πŸ“‘
  • Portugal
  • 06:28 (UTC)

Highlights

  • Pro

Block or report 0xASTRA

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
0xASTRA/README.md

πŸ‘Ύ Red Team Operator | Vulnerability Researcher

I'm an offensive security professional dedicated to identifying and exploiting vulnerabilities to strengthen system defenses. With expertise in red teaming, binary exploitation, reverse engineering, and malware analysis, I focus on solving complex security challenges.


πŸ† Achievements

  • Certified Network Penetration Tester (CNPen) β€” Passed with Merit.
  • CVE Contributions β€” Recognized for uncovering and reporting CVE-2024-43416.

πŸ” Expertise

  • Red Teaming & Penetration Testing

    • Specialized in Linux, Windows, and Active Directory environments.
  • Reverse Engineering & Exploit Development

    • Expert in identifying and exploiting system-level vulnerabilities.
  • Malware Analysis & Development

    • Creating evasive payloads to bypass modern AV/EDRs.
  • Rootkit/Bootkit Development

    • Low-level system manipulation and stealth techniques.
  • Programming

    • Skilled in C, Python, and Assembly for low-level and systems programming.

πŸ“š Continuous Learning

I believe that understanding offensive techniques is key to building resilient systems. Whether it's participating in CTFs, analyzing malware, or developing exploits, I work to keep up with the fast-changing field of cybersecurity and stay prepared for new challenges.


Pinned Loading

  1. CTF-Walkthroughs CTF-Walkthroughs Public

    Here I will post my ctf walkthroughs

    2

  2. security-pcc security-pcc Public

    Forked from apple/security-pcc

    Private Cloud Compute (PCC)

    Swift