Skip to content
View t1b4n3's full-sized avatar

Block or report t1b4n3

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
t1b4n3/README.md

Hello World

🔹 IT student passionate about binary exploitation, reverse engineering, malware development and low-level systems development | CTF player.
🔹 Aspiring Vulnerability Researcher and Exploit Developer.
🔹 Currently learning advanced binary exploitation techniques and diving into kernel development & exploitation.


BLOG

t1b4n3.github.io — posts on exploitation, reversing, and CTFs.


Featured Projects

  • TibaneC2 → A custom red team Command & Control (C2) framework
    • Status: In active development

Languages and Tools



Pinned Loading

  1. TibaneC2 TibaneC2 Public

    A lightweight, modular Command and Control (C2) framework built for offensive security research and red teaming (Post Exploitation).

    C 62 9

  2. 0xroadmap 0xroadmap Public

    Roadmap to learn binexp, rev, vr, and systems programming

  3. ctf-writeups ctf-writeups Public

    Solutions to CTF challenges I have Solved

    Python

  4. pwn-env pwn-env Public

    Docker environment for binary exploitation

    Dockerfile