Skip to content
View XORMANCER's full-sized avatar
🐰
Wake up, Neo
🐰
Wake up, Neo
Block or Report

Block or report XORMANCER

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
XORMANCER/README.md

header

./whoami

Hello!

My name is Everett. I am a security researcher who is passionate about low-level research.

My skillset

  • 🧬 Reverse Engineering
    • College level skillset in x86/x64, with a focus on *nix platforms. Currently working with Windows.
      • Studying for the OSED
  • Wireless exploitation
    • 5+ years as an instructor for DOD personel teaching wireless enumeration and exploitation.
  • 💀 Penetration testing
    • Hands on knowledge in auditing small scale networks in DoD events and online CTF/HTB platforms.

Latest posts

  1. 🚩 CTF - The Necromancer
    A walkthrough of the vulnhub box - The Necromancer 1

  2. 🦄 PWN - Vulnserver
    Exploiting the TRUN command within the vulnserver binary

Contact me

All profile art is a result of modifying the works of Mistigris computer arts, and has been created for personal use.

Pinned

  1. BLACKMOTH BLACKMOTH Public

    Crystal utility to automate the capture of an 802.11 handshake via aireplay-ng/mdk4

    Crystal 4 1

  2. WHITECAT WHITECAT Public

    Crystal utility to automate PMKID capture via HCXDUMPTOOLS

    Crystal 8 1

  3. Wardriving-Utilities Wardriving-Utilities Public

    Collection of wardriving utilities written in C++

    C++ 7