Skip to content
View HyperPS's full-sized avatar

Block or report HyperPS

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
hyperps/README.md

Hi there 👋

Welcome to HyperPS — where security meets engineering.

This is my ✨ special ✨ repository.
Anything you see here is either breaking something (ethically) or fixing something (responsibly).


🔭 I’m currently working on

  • Advanced security research (RCE, sandbox escapes, supply-chain issues)
  • Android internals, stealth services, and system-level automation
  • Fuzzers for media parsers (JPEG/WebP/etc.) and message preview engines
  • High-integrity patches & security PRs for open-source ecosystems

🌱 I’m currently learning

  • Deep-dive exploit chains (browser → kernel → sandbox)
  • ML model security (tokenizers, ONNX, quantization pipelines)
  • Scalable backend architectures for remote telemetry

👯 I’m looking to collaborate on

  • Security research & vulnerability discovery
  • High-performance tooling (Python/Rust/Go)
  • Open-source patch contributions

🤔 I’m looking for help with

  • Expanding fuzz coverage on message preview frameworks
  • More efficient input mutation strategies for media engines
  • Device-independent Android test harnesses

💬 Ask me about

  • CVE processes, patch design, and disclosure strategy
  • Android stealth/background services
  • Fuzzing pipelines, crash triaging, PoC development
  • AES/TCP client-server systems

📫 How to reach me

💬 GitHub Issues & Discussions are welcome

😄 Pronouns

He/Him

⚡ Fun fact

I break things so others can sleep peacefully 😄
Also: my fuzzers have found more bugs at 3 AM than I have caffeine left.


“Security is not a product — it’s a continuous fight.”
— HyperPS

Popular repositories Loading

  1. System-Update System-Update Public

    A basic Android background service that connects to a remote server, executes commands, and returns encrypted output. Disguised as a system update for educational fun. Not advanced, not stealthy. F…

    Python 22 3

  2. System-Update-L2 System-Update-L2 Public

    SystemUpdate is an advanced Android background client for educational use. It connects to a remote server over AES-encrypted TCP, executes shell commands, records audio, captures photos, transfers …

    Python 6 4

  3. KeyloggerUpdate KeyloggerUpdate Public

    This project is a stealth-focused Windows keylogger written in C++17, using native Windows API and WinHTTP for secure exfiltration of data to Telegram.

    C++ 4 4

  4. Verify-First Verify-First Public

    A deceptive Cloudflare-style verification page that collects detailed browser, system, and location data—including webcam snapshots—and sends it to a Telegram bot. Built with HTML, CSS, and JavaScr…

    HTML 1 1

  5. Shellcode-IDE Shellcode-IDE Public

    Forked from CX330Blake/Shellcode-IDE

    Shellcode

    Python 1

  6. HyperPS1 HyperPS1 Public

    This tool demonstrates how to extract browser cookies, saved passwords, and session data without admin rights, highlighting local data exposure risks. Supports Edge & Chrome. Built for security res…

    1