_ _ __ __
/\ | | | | | \/ |
/ \ _ __| |_| |__ | \ / | __ _ _ _ _ __ _ _ __ _
/ /\ \ | '__| __| '_ \ | |\/| |/ _` | | | | '__| | | |/ _` |
/ ____ \| | | |_| | | | | | | | (_| | |_| | | | |_| | (_| |
/_/ \_\_| \__|_| |_| |_| |_|\__,_|\__,_|_| \__, |\__,_|
__/ |
|___/
A Cybersecurity Enthusiast :)
who specialises in ->
> Malware Development
> Reverse Engineering
> PenTesting
> RF HackingI prefer developing my own tools, malwares, protocols rather then using scripts
Not a script kiddy anymore :)
And I use these languages for the same ↓
Now since you are here why not visit my repositories How about this one [ https://github.com/Oorth/Remote-Access-Trojan-Windows ]
You will like it (⌐■_■)
My Linked in -> https://www.linkedin.com/in/arth-maurya/