Skip to content
View ind4skylivey's full-sized avatar
:electron:
postscript: l'universo |Share Ur Beat|
:electron:
postscript: l'universo |Share Ur Beat|

Block or report ind4skylivey

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
ind4skylivey/README.md

👋 Welcome to my Cyber Arsenal

🛡️ Ethical Hacker | Linux Enthusiast | Security Researcher | Red Team Operator 🧠

ind4skylivey


🧠 About Me

Passionate Ethical Hacker and Security Researcher with a deep focus on Red Team Operations, Exploit Development, and Offensive Security. I specialize in building custom tools, developing exploits, and researching vulnerabilities to strengthen defensive postures.

When I'm not breaking systems ethically, I'm tinkering with Linux internals, automating workflows, or competing in CTF challenges. I believe in the philosophy of understanding systems from the ground up—from kernel modules to network protocols.

Currently contributing to security projects at @S1b-Team and actively researching new attack vectors and evasion techniques.


🎓 Certifications & Learning Path

  • OSCP – Offensive Security Certified Professional (Completed)
  • ARTE – Advanced Red Team Engagement (Certified)
  • CASP+ – CompTIA Advanced Security Practitioner
  • 🔄 CEH – Certified Ethical Hacker (In Progress)

💻 Tech Stack & Tools

🔤 Languages

🛠️ Security Tools

🐧 Operating Systems

⚙️ Development Environment

🖥️ Window Manager & Desktop

💻 Terminal Emulators

🔧 System Utilities


🧩 Core Specialties

🔴 Red Teaming & Adversary Simulation

Development of custom payloads, OPSEC-safe C2 infrastructure, spear-phishing campaigns, and full-scale adversary emulation. Focused on realistic attack scenarios that help organizations identify and remediate security gaps.

💥 Exploitation & Privilege Escalation

Deep expertise in memory corruption (stack/heap overflows), web vulnerabilities (XSS, RCE, SSRF, IDOR), and privilege escalation techniques across both kernel and userland contexts.

⚙️ Scripting & Automation

Building automated reconnaissance pipelines, custom offensive tools, and data parsing frameworks for red team operations. Focus on efficiency and reproducibility in security assessments.

🔍 Reverse Engineering & Binary Exploitation

Experienced in static and dynamic analysis of binaries, solving pwn challenges, and researching both public and private CVEs. Comfortable with x86/x64 assembly and low-level debugging.

🕸️ Web Application Security

Conducting deep security audits of modern web applications, exploiting OWASP Top 10 vulnerabilities, WAF bypass techniques, and abusing REST/GraphQL APIs.

🧬 Malware Development & Evasion

Creating custom packers and crypters, implementing AV/EDR evasion techniques, sandbox detection, process injection, and API hooking for advanced persistence mechanisms.

🧠 Cyber Threat Intelligence & OSINT

Gathering and analyzing threat intelligence, tracking adversary TTPs, and leveraging OSINT methodologies for reconnaissance and target profiling.

🧰 DevSecOps & Secure Development

Integrating security into the development lifecycle, performing secure code reviews, and building security-first infrastructure with automation and monitoring.


🐧 Linux Philosophy

I breathe terminal. Linux is not just an OS—it's a way of thinking.

From bare-metal installations to kernel hardening, I thrive in the deep internals of Linux systems. Whether it's writing custom systemd services, compiling kernels, or optimizing network stacks, I enjoy every layer of the stack.

Favorite Distros: Arch Linux 🖤 | Debian | Kali | NixOS


🚀 Projects & Contributions

🔐 Currently building and contributing to internal security tools at @S1b-Team
🛠️ Custom payload generators, enumeration scripts, and reconnaissance automation tools are part of my daily workflow
🧪 Actively researching new exploitation techniques and publishing findings responsibly
🐧 Maintaining dotfiles-s1b - Complete Arch Linux configuration with DWM, custom themes, and development environment


📊 GitHub Stats

GitHub Stats

Top Languages

GitHub Streak


📫 Connect With Me


"The quieter you become, the more you can hear." — Kali Linux motto

⚠️ All tools and techniques shared are for educational purposes and authorized security testing only.

Pinned Loading

  1. dotfiles-s1b dotfiles-s1b Public

    dwm-config: Definitely Not Suspicious™ Catppuccin purple theme, systray support, window swallowing, and extensive autostart integration. Configured with Rofi launcher, Flameshot screenshots, Picom …

    Shell 1

  2. 0ptiscaler4linux 0ptiscaler4linux Public

    The intelligent OptiScaler installer Linux gamers needed. Automates FSR4, XeSS & DLSS configuration with GPU-optimized profiles for RDNA3/4, Arc & RTX cards.

    Shell

  3. zed-ultimate-config zed-ultimate-config Public

    🚀 Complete professional Zed IDE configuration for PHP/Laravel,Python, Rust, and Security Research. 163+ snippets, 106 tasks, 31 keybindings.

    Shell