Skip to content
View cipher-attack's full-sized avatar
💭
👾
💭
👾

Block or report cipher-attack

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
cipher-attack/README.md
Typing SVG
Cipher Key

~/.ωнσαмι

C I P H E R

Animated Hacker Badge Visitor Badge

// root@¢ιρнєя:~# cat description.txt

red teamer focusing on мobile-first σffensive Security. honestly, forget the heavy rigs.. i'm just deploying full attack vectors straight from my phone. by leveraging Termux & some custom chroot environments, i basically flip standard mobile hardware into a weaponized C2 node.

  • running on AArch64 via proot-distro/nethunter.
  • mostly focused on Cellular egress & gray-man tactics to stay under the radar.
  • plus, i use Python for all my air-gapped extraction automation.

Cipher Studio



>_ ιиfяα:
basically running a headless kali setup inside android user-space. no cloud, no bs—everything is 100% Local execution.

>_ тαℓк:
honestly, the most dangerous computer is the one you’ve got in your pocket right now.


​!! нєα∂ѕ υρ: authorized access only. i’m watching the logs, so stay out.



current_focus

doing some vulnerability research and exploit dev on the side. basically scanning targets, sniffing packets, and just automating payloads for fun. this profile is where i track my tools and activity while building stuff for the offensive security community.


>_ѕуѕтєм_мєтяι¢ѕ

Metrics Terminal 3D Isometric Calendar Lines of Code

>_яє¢єит_αυ∂ισ_ℓσgѕ

Spotify Music Activity

>_gℓσвαℓ_тαяgєт_мαρ

Stargazers Worldmap

>_му_α¢тινιту_иєтωσяк

Snake Animation



CORE_STRENGTH: OFFSEC | ˢᵗᵃᵗᵘˢ: 𝖔𝖓𝖑𝖎𝖓𝖊

>_ᥴꪮꪮꪑ𝘴..

X   YouTube   LinkedIn   GitHub



𝚝𝚑𝚎 𝚜𝚢𝚜𝚝𝚎𝚖 𝚒𝚜𝚗'𝚝 𝚛𝚎𝚊𝚕𝚕𝚢 𝚋𝚛𝚘𝚔𝚎𝚗. 𝚒𝚝 𝚠𝚊𝚜 𝚓𝚞𝚜𝚝 𝚋𝚞𝚒𝚕𝚝 𝚝𝚑𝚒𝚜 𝚠𝚊𝚢. 𝚒 𝚓𝚞𝚜𝚝 𝚑𝚊𝚙𝚙𝚎𝚗𝚎𝚍 𝚝𝚘 𝚏𝚒𝚗𝚍 𝚝𝚑𝚎 𝚍𝚘𝚘𝚛.

Pinned Loading

  1. Camphish-pro Camphish-pro Public

    A web-based social engineering tool designed to demonstrate browser camera permission vulnerabilities for educational purposes.

    HTML 21 7

  2. cipher_academy cipher_academy Public

    Learn Python and ethical hacking directly in your browser. No installation required, just real code and real simulations.

    TypeScript 3 1

  3. Hacker-Hall-of-Fame Hacker-Hall-of-Fame Public

    HTML 6 1

  4. awesome-digital-freedom awesome-digital-freedom Public

    definitive operational framework for digital sovereignty, privacy, and open-source intelligence. No bloat. Pure signal.

    3

  5. cipher-osint cipher-osint Public

    CIPHER-OSINT is a high-performance information gathering framework built with Golang. It leverages LLM integration for automated data analysis and utilizes Tor-based routing for secure, anonymous r…

    HTML 8 6

  6. Super_telegram Super_telegram Public

    Project Akasha: A human-mimicking Telegram UserBot powered by the Gemini Neural Engine. It automates conversations naturally, generates studio-quality voice notes, and manages media without reveali…

    Python 9 5