This repository is my offensive security hub — a collection of projects that explore the full attack chain:
- 🐞 Exploit Development → breaking in 🚪
- 🐹 Malware Development (Go) → staying in 🕵️
- 🎭 Tradecraft / Adversary Emulation → simulating real-world TTPs
⚡ Designed for red teamers, researchers, and learners who want to dive into adversary simulation, post-exploitation, and low-level offensive programming.
-
🐞 Exploit Development
🔹 Vulnerability research, memory corruption, PoCs, shellcoding -
🐹 Malware Development (Go)
🔹 Windows API, persistence, injection, evasion techniques -
🎭 Tradecraft / TTPs
🔹 MITRE ATT&CK-based adversary emulation (e.g., FIN6), red team labs -
🌐 C2 Command & Control
🔹 Adaptix C2 → A modular, lightweight C2 framework with focus on stealth and operator usability.
✔️ Build a structured red team toolkit
✔️ Document offensive security techniques
✔️ Practice realistic adversary emulation
✔️ Share knowledge for learners & professionals
- ✅ Educational purposes 📚
- ✅ Authorized penetration testing 🖋️
- ✅ CTF competitions 🏆
- ✅ Research 🔬
- ❌ Unauthorized access 🔓
- ❌ Malicious activities ⚔️
- ❌ Illegal hacking 🏴☠️
- 🙅♂️ You are solely liable for misuse
- ⚖️ Comply with all laws (CFAA, GDPR, etc.)
- 📝 Get written permission before testing
- 🚓 Legal consequences possible for abuse
🛡️ Use responsibly. Stay ethical. Stay legal. 🛡️