Skip to content
View mulwareX's full-sized avatar

Block or report mulwareX

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
mulwareX/README.md

πŸ‘‹ Hello, I'm MULWARE

Cybersecurity Researcher | Red Team Operator | Malware Developer

Breaking systems to understand them better.

Website LinkedIn GitHub

Views


🎯 About Me

I am a Red Team Operator and Malware Developer focused on offensive security research.

I specialize in:

  • Advanced Red Team Operations
  • Malware Development
  • Windows Internals
  • Exploit Development
  • Command & Control Infrastructure
  • AV / EDR Evasion Techniques

I enjoy building offensive security tools and researching new ways to bypass modern defenses.


πŸ’» Tech Stack:

Python Windows Terminal C C# C++ AssemblyScript HTML5 JavaScript PowerShell PHP AWS Cloudflare Django Chart.js Flask Jinja NPM Apache Nginx Apache Tomcat MySQL SQLite MariaDB Firebase MicrosoftSQLServer Canva GitLab Git GitHub Arduino CMake

πŸ” Security Focus

  • Red Team Infrastructure
  • Command & Control Development
  • Malware Research
  • Exploit Development
  • Windows Internals
  • AV/EDR Bypass

πŸŽ“ Certifications

πŸŽ“ Certifications

OSCP OSCP+ CRTO PNPT MALDEV CCNA

  • PNPT β€” Practical Network Penetration Tester
  • OSCP
  • OSCP +
  • CRTO β€” Certified Red Team Operator
  • Malware Development Certification
  • Cisco Ethical Hacker

πŸš€ Current Focus

Currently researching and developing:

  • Custom C2 frameworks
  • DNS over HTTPS C2
  • AV / AMSI bypass techniques
  • Advanced malware loaders
  • Post exploitation tooling
  • Exploits

πŸ“Š GitHub Stats


πŸ“‚ Projects

Some projects I work on include:

  • πŸ”΄ Red Team Tools
  • 🦠 Malware Development Research
  • ⚑ Exploit Development
  • πŸ” Offensive Security Automation

Check them here:

πŸ‘‰ https://github.com/mulwarex?tab=repositories


πŸ“« Connect With Me


"Offense drives defense."

Pinned Loading

  1. Shadow-Stream Shadow-Stream Public

    ShadowStream is a stealthy, lightweight screen streaming tool designed to capture and transmit desktop frames over HTTP

    Python 7 1

  2. RedefiningReality/Cobalt-Strike RedefiningReality/Cobalt-Strike Public

    Various resources to enhance Cobalt Strike's functionality and its ability to evade antivirus/EDR detection

    C++ 323 72

  3. EricEsquivel/Inline-EA EricEsquivel/Inline-EA Public

    Cobalt Strike BOF for evasive .NET assembly execution

    C 309 36

  4. CVE-2025-6218-POC CVE-2025-6218-POC Public

    RARLAB WinRAR Directory Traversal Remote Code Execution

    Python 10 4