Skip to content
View rajexploit404's full-sized avatar
๐Ÿ 
Working from home
๐Ÿ 
Working from home

Block or report rajexploit404

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this userโ€™s behavior. Learn more about reporting abuse.

Report abuse
rajexploit404/README.md

Hi ๐Ÿ‘‹, I'm RajExploit404

Cybersecurity Engineer | Ethical Hacker | Reverse Engineer

Typing SVG


About Me

I am a passionate Cybersecurity Engineer and Ethical Hacker who thrives on breaking systems (legally) to make them stronger.
My main expertise lies in penetration testing, reverse engineering, and digital forensics. I enjoy challenging myself with complex problems and continuously learning cutting-edge technologies in the field of cybersecurity.

  • Currently working on: Advanced C2 Frameworks, Honeypots, and Secure Tunnel Protocols
  • Currently learning: Kernel-level programming in C & advanced malware analysis
  • Motto: Hack to Protect, Secure to Win!
  • Goal: To make the digital world safer through secure development and ethical hacking.

Tech Arsenal

Here are the tools, languages, and platforms I use to research, test, and secure systems:

  • Operating Systems

    • Custom OS but Based on Debian
    • Windows
    • Debian Addictโ˜๏ธ
  • Programming Languages

    • Python
    • Bash
    • C
  • Security & Analysis Tools

    • Nmap
    • Wireshark
    • Metasploit Framework
    • Burp Suite
    • John the Ripper / Hashcat
    • OpenVAS
    • IDA / Ghidra
  • Focus Areas

    • Penetration Testing
    • Vulnerability Assessment
    • Exploit Development
    • Digital Forensics
    • Incident Response

GitHub Stats

GitHub stats GitHub Streak

Top Languages


Featured Projects

Here are some of the key projects I've built and maintained:

  • Simple C2 SSH โ€“ Lightweight command & control framework over SSH with user authentication & custom shell
  • HoneyFTP โ€“ Honeypot FTP server designed to deceive and log attackers
  • ShadowTunnel โ€“ Covert tunneling protocol with encrypted authentication

Research & Interests

  • Advanced exploit development and buffer overflows
  • Malware reverse engineering and obfuscation techniques
  • Secure protocol design at the kernel/network layer
  • Red Team vs Blue Team simulation environments

Connect with Me


๐Ÿš€ **"Hack the planet, but make it safer."** ๐ŸŒ

Pinned Loading

  1. rajexploit404 rajexploit404 Public

    Config files for my GitHub profile.

  2. ping-of-death ping-of-death Public

    Simple PoD (Ping of Death) method with ip spoofing built from python3

    Python 1

  3. layer4-simple-ddos-proxy layer4-simple-ddos-proxy Public

    Simple DDoS attack layer4 by rajexploit404

    Python 1

  4. filetemporaryupload filetemporaryupload Public

    Upload Your File to Temporary File With cURL in Terminal

    1

  5. fastproxy-checker fastproxy-checker Public

    Fast Proxy Checker By RAJEXPLOIT404

    Python