Skip to content
View 0xNullVector's full-sized avatar

Block or report 0xNullVector

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
0xNullVector/README.md
██████╗  ██████╗  ██████╗ ████████╗██╗  ██╗ █████╗  ██████╗██╗  ██╗███████╗██████╗
██╔══██╗██╔═══██╗██╔═══██╗╚══██╔══╝██║  ██║██╔══██╗██╔════╝██║ ██╔╝██╔════╝██╔══██╗
██████╔╝██║   ██║██║   ██║   ██║   ███████║███████║██║     █████╔╝ █████╗  ██████╔╝
██╔══██╗██║   ██║██║   ██║   ██║   ██╔══██║██╔══██║██║     ██╔═██╗ ██╔══╝  ██╔══██╗
██║  ██║╚██████╔╝╚██████╔╝   ██║   ██║  ██║██║  ██║╚██████╗██║  ██╗███████╗██║  ██║
╚═╝  ╚═╝ ╚═════╝  ╚═════╝    ╚═╝   ╚═╝  ╚═╝╚═╝  ╚═╝ ╚═════╝╚═╝  ╚═╝╚══════╝╚═╝  ╚═╝

// low-level offense. kernel land. competitive hacking.

CTF Rank Focus Platform Language


whoami

$ cat /etc/passwd | grep rootkitdev
rootkitdev:x:0:0:Security Researcher:/root:/bin/zsh

$ id
uid=0(root) gid=0(root) groups=0(root),1337(elite)

Low-level security researcher operating primarily in kernel space. I write rootkits, develop exploits, reverse engineer malware, and break things for sport on weekends via CTF competitions. My work sits at the intersection of systems programming and offensive security — from ring-0 implants to userland exploitation chains.

Not affiliated with any threat actor. All research is conducted in isolated lab environments.


ls -la ~/research

Kernel & Rootkit Development

  • LKM Rootkits — Linux Kernel Module–based persistence, process hiding, file cloaking, syscall hooking via ftrace / direct DKOM
  • DKOM Manipulation — Direct Kernel Object Manipulation for hiding processes from ps, top, /proc
  • Syscall Hookingsys_call_table patching, kprobes, ftrace-based inline hooks
  • eBPF Offensive Use — Weaponising eBPF for stealthy keylogging, network sniffing, and evasion
  • Bootkit Research — UEFI-level persistence, EFI runtime service hooks

Exploit Development

  • Linux ELF Exploitation — Stack/heap overflow, ROP chains, FSOP, off-by-one, format string
  • Windows Kernel Exploits — IOCTL abuse, pool corruption, token privilege escalation
  • Browser Exploitation — JIT spraying, type confusion, sandbox escape primitives
  • Bypassing Mitigations — KASLR/ASLR/PIE bypass, SMEP/SMAP/NX evasion, CFG/CET bypass
  • CVE Research — Vulnerability discovery via fuzzing and manual source/binary auditing

Malware & Implants

  • C2 Implants — Custom beacons with encrypted comms, jitter, and malleable profiles
  • Persistence Mechanisms — Scheduled tasks, COM hijacking, registry, WMI subscriptions, bootloaders
  • AV/EDR Evasion — Syscall unhooking, PPID spoofing, process injection (APC, hollowing, stomping)
  • Anti-Analysis — Anti-debug, anti-VM, timing attacks, obfuscation pipelines

cat ~/ctf/stats.json

{
  "active_since": "20XX",
  "events_competed": "100+",
  "favourite_categories": [
    "pwn",
    "rev",
    "kernel",
    "misc (the giga-brain ones)"
  ],
  "preferred_platforms": ["CTFtime", "HackTheBox", "pwn.college"],
 
  "write_ups_published": true
}

lsmod | grep skills

Domain Tools / Techniques
Languages C · C++ · x86/x64 ASM · Python · Rust
Reversing IDA Pro · Ghidra · Binary Ninja · x64dbg · Radare2
Exploitation pwntools · GDB + pwndbg/peda · ROPgadget · ropper
Kernel Linux KMD · WinDbg · KGDB · volatility3
Fuzzing AFL++ · libFuzzer · Syzkaller · Jackalope
Networking Wireshark · Scapy · Zeek · custom C2 stacks
Virtualisation QEMU/KVM · VMware · Hyper-V · KASAN lab setups

git log --oneline ~/projects

a1f3c9e  [rootkit] eBPF-based process hider with ring-0 comms channel
8b2d441  [exploit] CVE-XXXX-XXXXX — Linux kernel heap UAF → LPE
3e9fa20  [ctf] write-up: kernel heap exploit, corCTF 2024
d47c102  [implant] custom C2 with encrypted DNS-over-HTTPS exfil
f19a831  [research] DKOM walk — hiding from eBPF-based EDRs
0cc7741  [tool] syscall-unhook — restore NTDLL hooks via fresh mapping
9a3e558  [ctf] write-up: browser pwn via JIT type confusion

Note: Offensive Tools are kept private or are published responsibly after coordinated disclosure. Public repos contain sanitised PoCs, research notes, and CTF solutions only.


cat ~/philosophy.txt

> Understand the system before you break it.
> Break it before someone else does.
> Document everything. Leave the scene better than you found it.
> The kernel has no secrets — only patience requirements.

netstat -an | grep contact

CTFtime HackTheBox


dmesg | tail

[ 0.000000] GitHub stats kernel initialising...
[ 0.001337] Counting commits... done.
[ 0.002600] Enumerating languages... C, ASM, Python, Rust
[ 0.003999] Mounting /proc/contributions

GitHub Stats Top Langs


All research and tooling on this profile is intended for educational purposes, authorised testing, and responsible disclosure only. Use of any published code against systems you do not own or have explicit written permission to test is illegal.

[ kernel panic — not syncing: you've reached the end of the README ]

Pinned Loading

  1. Methodology Methodology Public

    My Pentesting Methodology

  2. ghostwire ghostwire Public

    an educational LKM rootkit PoC

    C

  3. crt.sh-enum crt.sh-enum Public

    subdomain enumeration by querying crt.sh

    Python

  4. NetSentinel NetSentinel Public

    A PoC Passive Network Threat Intelligence Engine written in python

    Python