Skip to content
View medaminkh-dev's full-sized avatar
🤖
🤖

Block or report medaminkh-dev

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
medaminkh-dev/README.md

Low-level security researcher | Reverse Engineering · Binary Exploitation · Network Attacks · Digital Forensics
Passionate about going deep into systems — from raw sockets and memory forensics to kernel structures and hardware boundaries.

Currently building a public roadmap of offensive/defensive security tools in Python, C, Bash, and raw assembly when needed. All projects are designed for authorized testing, education, and red/blue team practice.

🔬 Current Focus & Interests

  • Binary analysis, patching, and exploit development
  • Custom network packet crafting and wireless attacks
  • Memory & file forensics, side-channel research
  • Cloud misconfiguration hunting and risk modeling
  • Future deep dives: Kernel Exploitation · Hypervisor Security · Browser Exploitation & Sandbox Escape · Firmware/IoT Low-Level · Secure Boot & Baseband

🚀 Featured Projects

Project Description Tech Stars
Raw_Overflow_Forge All-in-one ROP exploitation engine: automated binary analysis, gadget chaining, payload generation Python ⭐ 2
shellcode_Weaver Professional shellcode generator, mutator, and analyzer for research & education Python ⭐ 1
Privilege-Escalator Linux privilege escalation scanner with parallel vector probing and intelligent chaining Bash/Shell ⭐ 1

🛤️ Public Roadmap – Upcoming Tools (In Development)

I'm working through a structured 16-project pipeline, released in phases. Each tool is built from scratch (no heavy dependencies) to deepen low-level understanding.

Phase 2: Networks & Wireless

  1. Packet Phantom – Raw socket packet forger (SYN floods, TCP hijacks) + honeypot echo mode
  2. ARP Reaper – Silent ARP spoofing & relay attacks with MAC flood simulation
  3. WiFi Ghost Buster – Aircrack-style scanner with rogue AP detection
  4. MITM Labyrinth – SSLStrip + BeEF integration with HSTS timing bypass

Phase 3: Forensics & Crypto

  1. Memory Ghost Carver – Volatility-free RAM parser in C with anti-forensic simulation
  2. Key Bleeder – Timing & power side-channel attack simulator + defensive jammer
  3. File Resurrectionist – Sleuth Kit-style carver with steganography hunting
  4. Crypto Cracker Forge – Custom JohnTheRipper wrapper with salted-hash bypass rules

Phase 4: Cloud & Management

  1. Cloud Shadow Enum – Public-endpoint AWS/Azure scanner + trail cleanup
  2. Risk Labyrinth Mapper – Attack-path graphing from Nmap XML with MITRE ATT&CK mapping
  3. Log Phantom Annihilator – Syslog tampering detector + false-positive injector
  4. PenTest Command Citadel – Full-cycle Bash framework with autopilot chaining

Projects will be released progressively — follow or ⭐ the repo to get notified.

🛠️ Tech & Tools I Work With

  • Languages: Python · C · Bash · Assembly (x86/x64)
  • Domains: Reverse Engineering · Exploit Development · Network Security · Digital Forensics · Cloud Security
  • Favorites: Raw sockets · Memory parsing · Custom exploit chains · Minimal-dependency tools

📬 Get in Touch

  • GitHub: @medaminkh-dev
  • Open to collaboration on low-level security research, CTF tools, or academic projects.

“The closer you get to the metal, the more you understand the system — and the more dangerous you become.”
— Building in public · One commit at a time.

Profile views

Popular repositories Loading

  1. Raw_Overflow_Forge Raw_Overflow_Forge Public

    ROF - Raw Overflow Forge 🔥 An all-in-one ROP exploitation engine that automates binary analysis, gadget extraction, and payload generation. Perfect for CTF challenges, security research, and learni…

    Python 2

  2. shellcode_Weaver shellcode_Weaver Public

    Shellcode Weaver is a professional security research and educational tool designed for authorized testing and learning about shellcode generation, analysis, and mutation. Written in Python, it serv…

    Python 1

  3. Privilege-Escalator Privilege-Escalator Public

    Take a Linux system and probe for privilege escalation vectors, kernel vulnerabilities, and misconfigurations with parallel scanning and intelligent exploit chaining. Designed for authorized securi…

    Shell 1

  4. Mobile-Security-Framework-MobSF Mobile-Security-Framework-MobSF Public

    Forked from MobSF/Mobile-Security-Framework-MobSF

    Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static a…

    JavaScript

  5. medaminkh-dev medaminkh-dev Public