Skip to content
View r2nw's full-sized avatar
🏠
Working from home
🏠
Working from home

Block or report r2nw

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
r2nw/README.md
    ██████╗ ███████╗███╗   ██╗
    ██╔══██╗██╔════╝████╗  ██║
    ██████╔╝█████╗  ██╔██╗ ██║
    ██╔══██╗██╔══╝  ██║╚██╗██║
    ██║  ██║███████╗██║ ╚████║
    ╚═╝  ╚═╝╚══════╝╚═╝  ╚═══╝
    [Red Team Operator Profile]
    [Target Acquisition: Active]

[Target Scope]

class RedTeamOperator:
    def __init__(self):
        self.name = "R3n"
        self.status = "Hunting"
        self.specialization = ["Infrastructure Penetration", "Social Engineering", "Post-Exploitation"]
        self.current_target = "Enterprise Security Systems"

[Exploitation Capabilities]

Primary Attack Vectors

├── Network Penetration
│   ├── Advanced Lateral Movement
│   ├── Privilege Escalation
│   └── Persistence Mechanisms
├── Web Application Security
│   ├── OWASP Top 10
│   ├── Custom Exploit Development
│   └── API Security Assessment
└── Social Engineering
    ├── Phishing Campaigns
    ├── Physical Security Bypass
    └── Human Psychology Manipulation

Arsenal Overview

$ ls -la /home/r3n/arsenal/
drwxr-xr-x  Exploitation_Frameworks/
drwxr-xr-x  Custom_Scripts/
drwxr-xr-x  Recon_Tools/
drwxr-xr-x  Post_Exploitation/
drwxr-xr-x  Zero_Day_Research/

[Operational Statistics]

SELECT * FROM achievements WHERE operator = 'R3n';
| Operation           | Status    | Impact Level |
|--------------------|-----------|--------------|
| CTF Level CLB      | Completed | Critical     |
| CTF CookieHanHoan  | Completed | High         |
| CBJS Red Team      | Certified | Maximum      |
| CBJS Pentest       | Certified | Maximum      |

[Active Operations]

const current_projects = {
    malware_development: "Custom C2 Infrastructure",
    vulnerability_research: "Windows Kernel Exploitation",
    tool_development: "Automated Post-Exploitation Framework",
    red_team: "Advanced Persistence Techniques"
}

[Command & Control]

def contact_channels():
    return {
        "offensive_blog": "https://r2nw.github.io",
        "command_center": "https://linkedin.com/in/ren1337",
        "intel_feed": "https://x.com/R3n_1337"
    }

[Technical Arsenal]

Offensive Tools

Python Metasploit BurpSuite

Attack Infrastructure

Linux Docker AWS

[System Compromise Statistics]

██████████████████░░░░░░░░░░  65.4%
Systems Compromised

Hack Stats

[Operation Logs]

$ cat /var/log/achievements.log
[+] Top 1 CTF Level CLB
[+] Top 2 CTF CookieHanHoan
[+] Advanced Infrastructure Penetration Specialist
[+] Custom Exploit Development Expert

[STATUS: ACTIVELY HUNTING]
[SYSTEMS: ARMED]
[TARGETS: ACQUIRED]

Popular repositories Loading

  1. RedTeam-Tools RedTeam-Tools Public

    Forked from A-poc/RedTeam-Tools

    Tools and Techniques for Red Team / Penetration Testing

    1

  2. awesome-list awesome-list Public

    Forked from 0xor0ne/awesome-list

    Cybersecurity oriented awesome list

    1

  3. r2nw.github.io r2nw.github.io Public

    Forked from cotes2020/jekyll-theme-chirpy

    A minimal, responsive and feature-rich Jekyll theme for technical writing.

    HTML 1

  4. AndroidMobilePentest101 AndroidMobilePentest101 Public

    Forked from tsug0d/AndroidMobilePentest101

    Pentesting Android Application Course For Kids+ (English and Vietnamese edition)

    Python

  5. BinaryNinja-Themes BinaryNinja-Themes Public

    Forked from FuzzySecurity/BinaryNinja-Themes

    Custom Binary Ninja Themes

  6. ctf-tools ctf-tools Public

    Forked from zardus/ctf-tools

    Some setup scripts for security research tools.

    Shell