Skip to content
View D4YDR34M-DEV's full-sized avatar

Block or report D4YDR34M-DEV

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this userโ€™s behavior. Learn more about reporting abuse.

Report abuse
D4YDR34M-DEV/README.md

Hi there ๐Ÿ‘‹, my name is Chuma

RED TEAM OPERATIONS

Experienced low-level programmer specializing in malware development and reverse engineering. Experienced in writing custom malicious code targeting Windows and Linux systems. Proficient in assembly, C, and Python with deep knowledge of operating system internals, anti-analysis techniques, and evasion methods.

Skills: C || C++ || Assembly || Python || Bash || Terraform || Linux

  • ๐Ÿ”ญ Iโ€™m currently working on AV/EDR evasion Techniques
  • ๐ŸŒฑ Iโ€™m currently learning Active Directory
  • ๐Ÿ‘ฏ Iโ€™m looking to collaborate on Cloud Native Projects
  • ๐Ÿ’ฌ Ask me about Malware Development
  • ๐Ÿ“ซ How to reach me: https://www.linkedin.com/in/chukwumanwaozuru/
  • ๐Ÿ˜„ Pronouns: Really him
  • โšก Fun fact: I love to make blue teamers cry.

github linkedin

trophy

Top Langs

GitHub stats

GitHub metrics

Popular repositories Loading

  1. D4YDR34M-DEV D4YDR34M-DEV Public

    RED TEAM OPERATOR

  2. IndirectSyscalls IndirectSyscalls Public

    Forked from ProcessusT/IndirectSyscalls

    This method bypasses the standard Windows API functions , making it harder to detect and hook .

    C++