About

Cybersecurity analyst by day, CTF competitor by night. Specialized in network security, exploit development, and cryptography with a focus on responsible disclosure. Former black hat turned security advocate working to build more secure systems for everyone.

Currently researching advanced persistence techniques and memory forensics. Regular speaker at DEFCON, Black Hat, and regional security conferences.

Skills

Penetration Testing
Checking & Config Makeing
Python
Exploit Development
Reverse Engineering
Spamming Skills
Botnet & DDOS
OSINT

Projects

MafiaWare666 Ransom

Advanced Encryption.

Python C++ & C Encryption & 128-bit

ShadowHack-KH1.0

Open-source C2 Remote Command Execution Tool.

Python Ethical Hacker Security

8Ball Pool 0Day

ONE-CLICK TAKEOVER Email Reset Password Miniclip / 2023.

Burp Privacy

Code Sample

# Port scanner with stealth capabilities import socket, random, time, sys def stealth_scan(target, ports, delay=0.5): results = [] for port in ports: sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM) sock.settimeout(1) time.sleep(delay + random.random()) result = sock.connect_ex((target, port)) if result == 0: service = "Unknown" try: service = socket.getservbyport(port) except: pass results.append((port, "OPEN", service)) sock.close() return results

Contact

✉️ fbianoncambodia@code-gmail.com
🔒 TOX : 53C8705036F7659DD0A7504F707D28F52D6960F3F4F3BA9075E14E7893CD754AB0593021F60D
🌐 furtntdrsld4dlny67csbgbud6djhv2bzfkidrhe37rpqpfbczy3nvqd.onion