Skip to content
View HyugaRED's full-sized avatar
🧿
Tunnel vision
🧿
Tunnel vision

Highlights

  • Pro

Block or report HyugaRED

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
HyugaRED/README.md

HYŪGA RED

red@hyuga:~$ cat identity.txt

Neurodivergent · Multipotentialite · Recursive by design
Tactician of chaos · Human vector exploiter · Silent operator


🛡️ Current Focus

  • Red Team Operations · Offensive Security
  • Social Engineering · OSINT · Psychological Exploitation
  • Post-Exploitation · Linux Internals · Privilege Escalation
  • Weapon of choice: Kali Linux, no duality. Only signal.

🛠️ Stack: Nmap · Burp · Hydra · Impacket · Metasploit · Spiderfoot · Custom Scripts


🎯 Mission Parameters

  • Operate full-time on Kali Linux
  • Master human vectors & information warfare
  • Certification path: PNPT or OSCP (Red Pill protocol)
  • Build everything with intent: tools, mindset, ecosystem
  • Psychology > Tools. Signal > Style. Persistence > Perfection.

🧰 Background

  • Ex-web backend (Laravel · JS · PHP · MySQL)
  • GitHub Pro since 2020 · ex-BeCode Charleroi
  • Now: Red Team operator with a human-first mindset
  • Philosophy: Tactical thinking > Tactical gear

🌀 Field Notes

This is not a portfolio.
This is a Red Team mental vault, recursively mapped.
Every repo is a thought. Every script, a strategy.
OSINT. SE. Post-ex. Repeat.


🔗 Access Point

🌐 Hyuga.red · HyugaLog

Enter the vortex. Stay for the recursion.


Pinned Loading

  1. spacerid spacerid Public

    Python

  2. HyugaLog HyugaLog Public

    HTML

  3. redhat-pentester-track redhat-pentester-track Public

    HTML

  4. phishing-demo phishing-demo Public

    JavaScript