Skip to content
View rajexploit404's full-sized avatar
🏠
Working from home
🏠
Working from home

Block or report rajexploit404

Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
rajexploit404/README.md

Hi πŸ‘‹, I'm RajExploit404

Cybersecurity Engineer | Ethical Hacker | Reverse Engineer

Typing SVG


About Me

I am a passionate Cybersecurity Engineer and Ethical Hacker who thrives on breaking systems (legally) to make them stronger.
My main expertise lies in penetration testing, reverse engineering, and digital forensics. I enjoy challenging myself with complex problems and continuously learning cutting-edge technologies in the field of cybersecurity.

  • Currently working on: Advanced C2 Frameworks, Honeypots, and Secure Tunnel Protocols
  • Currently learning: Kernel-level programming in C & advanced malware analysis
  • Motto: Hack to Protect, Secure to Win!
  • Goal: To make the digital world safer through secure development and ethical hacking.

Tech Arsenal

Here are the tools, languages, and platforms I use to research, test, and secure systems:

  • Operating Systems

    • Custom OS but Based on Debian
    • Windows
    • Debian Addict☁️
  • Programming Languages

    • Python
    • Bash
    • C
  • Security & Analysis Tools

    • Nmap
    • Wireshark
    • Metasploit Framework
    • Burp Suite
    • John the Ripper / Hashcat
    • OpenVAS
    • IDA / Ghidra
  • Focus Areas

    • Penetration Testing
    • Vulnerability Assessment
    • Exploit Development
    • Digital Forensics
    • Incident Response

GitHub Stats

GitHub stats GitHub Streak

Top Languages


Featured Projects

Here are some of the key projects I've built and maintained:

  • Simple C2 SSH – Lightweight command & control framework over SSH with user authentication & custom shell
  • HoneyFTP – Honeypot FTP server designed to deceive and log attackers
  • ShadowTunnel – Covert tunneling protocol with encrypted authentication

Research & Interests

  • Advanced exploit development and buffer overflows
  • Malware reverse engineering and obfuscation techniques
  • Secure protocol design at the kernel/network layer
  • Red Team vs Blue Team simulation environments

Connect with Me


πŸš€ **"Hack the planet, but make it safer."** 🌐

Pinned Loading

  1. rajexploit404 rajexploit404 Public

    Config files for my GitHub profile.

  2. ping-of-death ping-of-death Public

    Simple PoD (Ping of Death) method with ip spoofing built from python3

    Python 1

  3. layer4-simple-ddos-proxy layer4-simple-ddos-proxy Public

    Simple DDoS attack layer4 by rajexploit404

    Python 1 1

  4. filetemporaryupload filetemporaryupload Public

    Upload Your File to Temporary File With cURL in Terminal

    1

  5. fastproxy-checker fastproxy-checker Public

    Fast Proxy Checker By RAJEXPLOIT404

    Python