Skip to content
View Nuknov's full-sized avatar
⚠️
This account is under Federal Investigation.
⚠️
This account is under Federal Investigation.

Block or report Nuknov

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Nuknov/README.md

Nuknov

Red Team Enthusiast | Cybersecurity Researcher | Developer of Logic-Based Tools | Programmer Typing SVG

About Me

I'm deeply driven by understanding how systems break and how to build tools that simulate, detect, and defend against those threats.
From malware behavior to encryption, I explore the gray areas of code for educational and research purposes.
Alongside cybersecurity, I also work on tools that help developers understand logic, algorithms, and systems more clearly.


███╗   ██╗██╗   ██╗██╗  ██╗███╗   ██╗ ██████╗ ██╗   ██╗
████╗  ██║██║   ██║██║ ██╔╝████╗  ██║██╔═══██╗██║   ██║
██╔██╗ ██║██║   ██║█████╔╝ ██╔██╗ ██║██║   ██║██║   ██║
██║╚██╗██║██║   ██║██╔═██╗ ██║╚██╗██║██║   ██║██║   ██║
██║ ╚████║╚██████╔╝██║  ██╗██║ ╚████║╚██████╔╝╚██████╔╝
╚═╝  ╚═══╝ ╚═════╝ ╚═╝  ╚═╝╚═╝  ╚═══╝ ╚═════╝  ╚═════╝

🖥️ Areas of Interest

Anonymous@Nuknov:~$ ls -la
"Red Team Simulations & Ethical Exploits"/
"Custom Keyloggers & Behavioral Heatmaps"/
"Secure File Encryption & Decryption Systems"/
"Phishing & Social Engineering Simulations (for awareness)"/
"Code Obfuscation • Payload Generation • AI in Offensive Security"/
"Low-Level Programming for Real-World Logic Understanding"/

Tech Stack

Anonymous@Nuknov:~$ cat tech_stack_languages.txt

Languages:
    Python • C# • Java • Batch • Bash

Anonymous@Nuknov:~$ cat tech_stack_expertise.txt

Fields of Expertise:
    Ethical Hacking • System Tools • Malware Simulation • Reverse_Engineering

Anonymous@Nuknov:~$ cat tech_stack_frameworks.txt

Tools & Frameworks:
    keyLogging • IntelCollection • Recon • History_Harvesting

GitHub Presence

Stats


Highlights

  • 🔍 Released NukRecon → mini recon toolkit for red team simulations.
  • 🖥️ Created PC Intruder → a stealth system-monitoring & alert tool (not yet released).
  • 🌐 Designed Chrome History Decrypter → analyze & decrypt chrome browser history data.
  • 💾 Built USB_DATA_COLLECTOR → red team style tool for gathering drives data in stealth way.
  • 📝 Write-ups on reverse engineering & exploit development.

⚠️ Disclaimer

All repositories, tools, and content shared in this profile are intended solely for educational, research, and ethical testing purposes.
I do not support or encourage any form of illegal or unethical use of the code.
Use responsibly in labs, simulations, and learning environments only.


💡 Bonus:

“Automate the boring stuff, but keep it ethical.”
“Hack smart and remain in the shadows. - AnonKryptiQuz

Pinned Loading

  1. Chrome-History-Decrypter Chrome-History-Decrypter Public

    Modular Windows toolkit for Chrome history harvesting & red team demos.

    TeX 10

  2. USB_Data_Collector USB_Data_Collector Public

    A lightweight Windows automation tool which works on Windows only that automatically copies selected user folders to a USB drive.

    Batchfile 10

  3. JAVA-3x3-inverse JAVA-3x3-inverse Public

    A Java GUI-based 3x3 matrix inverse calculator with .exe export. A small programming project for students.

    Java 9

  4. ScreenPulse ScreenPulse Public

    ScreenPulse is a Windows based recon dropper that grabs system fingerprints, pulls a desktop screenshot every 2 minutes, and ships everything to your webhook without tripping Discord’s rate limit. …

    Python 3