Skip to content
View ExploitDeveloperDil's full-sized avatar

Block or report ExploitDeveloperDil

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Hi there! I'm Dilaksan πŸ‘‹

πŸ‘¨β€πŸ’» About Me

I'm a passionate Cybersecurity Researcher and Penetration Tester with a strong interest in exploit development and offensive security. I love diving deep into the intricacies of C programming to develop security tools and backdoors. I specialize in automating full red team operations and building tools for stealthy access and persistence.

πŸš€ Projects

πŸ”₯ BlackHatOps

C | Offensive Security | Windows

  • A stealthy Windows backdoor that provides shell access to the attacker.
  • Includes features like persistence across reboots and keylogging.
  • Designed to support offensive operations from a Linux-based server.
  • Includes reverse shell opener, shellcode execution, and remote process injection functionalities.

πŸ“œ [Malfunction Software]

C | Malware Development

  • A project aiming to create malfunction software that can autonomously execute pre-defined actions when triggered.
  • Targets multi-platform systems with emphasis on stealth and system control.

⚑ Tech Stack

  • Languages: C, Shellcode, C++
  • Tools: x64dbg, Metasploit, Msfvenom, Nmap, VS Code
  • Specialties: Exploit Development Researching, Penetration Testing Automation, Red Team Operations Automation, Reverse Engineering

πŸ› οΈ Skills

  • Exploit Development: I develop custom exploits based on windows executables.(Writing Executable Malware)
  • Red Team Automation: Working towards building automated tools to handle tasks like network scanning, vulnerability exploitation, and privilege escalation.
  • Malware Development: Focused on building backdoors, malware, and persistence techniques for Windows systems.

🌱 Currently Learning

  • Low Level Development: Exploring traditional computer background working principles.
  • Advanced Red Team Techniques: Delving deeper into advanced exploitation and evasion techniques.

πŸ“« How to Reach Me

Popular repositories Loading

  1. nmap nmap Public

    Forked from nmap/nmap

    Nmap - the Network Mapper. Github mirror of official SVN repository.

    C

  2. BlackHatOps BlackHatOps Public

    C programs for sockets, reverse shell, shellcode execution, and process injection.

    C

  3. ExploitDeveloperDil ExploitDeveloperDil Public

    Config files for my GitHub profile.

  4. Web Web Public

    My Full Website Portfolio Project