Skip to content
View Cur10s1tyByt3's full-sized avatar
:electron:
G00dL1k3 ;)
:electron:
G00dL1k3 ;)
  • Cur10s1tySp4c3

Organizations

@The-Caravan-of-Light

Block or report Cur10s1tyByt3

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Cur10s1tyByt3/README.md
logo logo

Typer

Stars Profile Views GitHub Followers

Hey!

I'm CuriosityByte (a.k.a. Cur10s1tyByt3), a cybersecurity enthusiast with a passion for exploring digital systems. My adventure into the cybersecurity realm began at age 12 and has evolved into a dedicated pursuit of understanding technology's intricate workings.

I focus on mastering techniques to counteract threats and safeguard systems, driven by keen attention to detail and an unquenchable curiosity. As a quick learner, I'm constantly seeking opportunities to expand my knowledge in cybersecurity and digital defense.


🛤️ Journey

┌─[Cur10s1tyByt3@Cur10s1tySp4c3]─[~]
└──╼ ls -la ~/journey
├── 📱 Started with APK modifications & game hacking
├── ☕ Explored Java programming foundations
├── 🦠 Delved into MalDev, Reverse Engineering & Malware Analysis
├── 🧬 Now into AI Red Teaming
└── 🌀 Next adventure: TBD... (My curiosity decides and whatever the digital realm throws at me next)

🧰 Tech Stack

C C++ C# .NET Python HTML CSS Java Windows

🛠️ Current Project

All-in-One Windows Reverse Engineering Toolkit designed for Offensive and Defensive Security, primarily for Reverse Engineering and Malware Analysis, with comprehensive tools for Penetration Testing and Digital Forensics.


✨ Stats & More

⚠️ All content and tools are intended for education, legitimate security research, and authorized testing environments. Use responsibly. ⚠️

Pinned Loading

  1. RE & Mal-Analysis Resources RE & Mal-Analysis Resources
    1
    # Reverse Engineering & Malware-Analysis Resources:
    2
    
                  
    3
    * Awesome Reverse Engineering: A curated list of awesome resources for reverse engineering, binary analysis, and assembly programming tools
    4
    <br/>https://github.com/mohitmishra786/reversingBits
    5
    
                  
  2. MalDev RoadMap MalDev RoadMap
    1
    # Malware Development RoadMap:
    2
    
                  
    3
    ## First off all, [read this](https://mini-01-s3.vx-underground.org/samples/Papers/Other/VXUG%20Zines/2022-12-04%20-%20About%20malware%20writing%20and%20how%20to%20start.html).
    4
    
                  
    5
    ## I would then highly recommend to learn the following things:
  3. ExploitDev Resources ExploitDev Resources
    1
    # Exploit Development Resources:
    2
    
                  
    3
    * Awesome Exploit Development: A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development
    4
    </br>https://github.com/CyberSecurityUP/Awesome-Exploit-Development
    5
    
                  
  4. Android RE Resources Android RE Resources
    1
    # Android Reverse Engineering Resources:
    2
    
                  
    3
    * A curated list of awesome Android Reverse Engineering training, resources, and tools
    4
    <br/>https://github.com/user1342/Awesome-Android-Reverse-Engineering
    5
    
                  
  5. iOS RE Resources iOS RE Resources
    1
    # iOS Reverse Engineering Resources:
    2
    
                  
    3
    * iOSRE: Useful and updated tools and knowledge on iOS reverse engineering and exploitation
    4
    <br/>https://github.com/kpwn/iOSRE
    5
    
                  
  6. Web Pentesting Resources Web Pentesting Resources
    1
    # Web Hacking Resources:
    2
    
                  
    3
    * Awesome Web Hacking: A list of web application security
    4
    <br/>https://github.com/infoslack/awesome-web-hacking
    5