Skip to content
View kUrOSH1R0oo's full-sized avatar

Block or report kUrOSH1R0oo

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
kUrOSH1R0oo/README.md

👾 Welcome to Kur0sh1ro's Cyber Lair 👾

Typing SVG

🚀 About Me

Hey, I'm Ivan, aka Kur0sh1ro, a 2nd-year BSIT student at Polytechnic University of the Philippines – Sta. Maria, Bulacan. I’m a cybersecurity enthusiast who’s obsessed with understanding how systems work, how they break, and how to secure them. My world revolves around CTFs, bug bounties, and diving deep into the mechanics of malware—all for educational purposes, of course! 🖥️

I’m a quiet coder who thrives in solitude, but mention exploits, shellcode, or vulnerabilities, and I’ll light up like a terminal with neon syntax highlighting. I’m not a genius, but I’m relentless—learning from every failure and aiming to level up by 1% every day.

🛠️ What I Do

  • 🔍 CTF Player: Tackling challenges to sharpen my hacking skills and outsmart puzzles.
  • 🪲 Bug Bounty Hunter: Finding and reporting vulnerabilities to make the internet a safer place.
  • 🕵️ Security Researcher: Exploring vulnerabilities, analyzing malware, and uncovering digital secrets.
  • 💉 Malware Developer: Crafting and studying malware to understand attacker mindsets (ethically, of course!).

💾 Tech Stack & Skills

💻 Languages

🖥️ Operating Systems

🔬 Specializations

  • 💥 Offensive Security: Ethical hacking, red teaming, and exploit development.
  • 🦠 Malware Development & Analysis: Building and dissecting malware to understand threats.
  • 🌐 Networking: Mastering protocols, traffic analysis, and system communication.
  • 🧱 Web Development: Creating and breaking web apps to understand both sides.

🌐 Connect with Me

📊 GitHub Stats

GitHub Stats

💾 "The only way to learn is to break things and fix them."

Popular repositories Loading

  1. Kudo Kudo Public

    Kudo is a versatile decoding toolkit that provides a range of algorithms to handle different types of encoded data. It simplifies the process of decrypting and decoding various formats, making it e…

    Python 1 2

  2. Kiroku Kiroku Public

    Kiroku Keylogger is a sophisticated tool designed for capturing and monitoring user activities on a target system. It collects information and transmits it to a remote server at regular intervals.

    Python

  3. Mitsuki Mitsuki Public

    Mitsuki is a Python script designed for brute-forcing SSH, FTP, and MySQL/mariaDB services. It utilizes multithreading to efficiently try multiple passwords from a specified wordlist against a targ…

    Python 1

  4. Haruko Haruko Public

    HARUKO is a robust tool designed to generate customizable password wordlists for brute-force attacks

    Python

  5. reverse-shell-payloads reverse-shell-payloads Public

    This repository contains all of the payloads I've used in my CTFs, some of this are not working in latest Operating Systems but in CTF situations, they do the work. Just don't ever use this for som…

    Java

  6. Seiryu Seiryu Public

    Seiryu is an advanced command-line utility designed for sophisticated password hashing, offering a comprehensive set of features and algorithms to bolster security. Below, you'll find an in-depth g…

    Python 1