Skip to content
View apt-0's full-sized avatar

Block or report apt-0

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
apt-0/README.md

Hi there πŸ‘‹

I build red-team tooling and AI systems β€” concise, testable, and production-quality code you can run in authorized lab environments. My focus blends offensive security research with applied AI: practical loaders and C2 prototypes for controlled red-team engagements, and AI agents and pipelines that accelerate threat emulation, operator workflows, and automation.

What I build

  • Offensive research & tooling β€” loader prototypes, C2 frameworks, post-exploitation helpers, and test harnesses for red-team exercises and adversary emulation.
  • AI for security β€” agentic workflows, tool-calling agents, RAG pipelines for threat intelligence, and automation to speed up purple/red team playbooks.

Projects (high level)

  • Loader β€” prototype loader for research and lab use (instrumented, audited, and intended for controlled environments).
  • C2 (Command & Control) β€” modular framework for simulation and emulation of adversary command and control flows in authorized tests.
  • AI Tools β€” agent templates, RAG examples, and tool integration demos designed to speed up threat research and automate routine tasks.

All projects are developed for research, testing, and defensive purposes. Use only in environments where you have explicit authorization.

Skills & stack

  • Offensive tooling: reverse engineering, process injection concepts, Windows internals (research-focused)
  • AI & LLMs: agents, tool calling, RAG, fine-tuning workflows, local/OSS models
  • Languages & tooling: Delphi, C/C++, Python, Go, shell, WinAPI, debugging and reverse engineering toolchains
  • Dev practices: reproducible examples, unit/integration tests, CI for security experiments

Popular repositories Loading

  1. RipeDB RipeDB Public

    Tool for searching in the RIPE DATABASE

    Python 8 2

  2. apt-0.github.io apt-0.github.io Public

    Ruby

  3. cobaltstrike-aggressor-scripts cobaltstrike-aggressor-scripts Public

    Forked from Peco602/cobaltstrike-aggressor-scripts

    A collection of Cobalt Strike Aggressor scripts.

    PowerShell

  4. EvilPuppetJS EvilPuppetJS Public

    Forked from nexon33/EvilPuppetJS

    Browser streaming MITM proxy

    JavaScript

  5. defendnot defendnot Public

    Forked from es3n1n/defendnot

    An even funnier way to disable windows defender. (through WSC api)

    C++

  6. system-prompts-and-models-of-ai-tools system-prompts-and-models-of-ai-tools Public

    Forked from x1xhlol/system-prompts-and-models-of-ai-tools

    FULL v0, Cursor, Manus, Same.dev, Lovable, Devin, Replit Agent, Windsurf Agent, VSCode Agent, Dia Browser & Trae AI (And other Open Sourced) System Prompts, Tools & AI Models.