Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings
@tibane0
tibane0
Follow

Nkateko Tibane tibane0

Exploring low-level development and the craft of pwning.

Block or report tibane0

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
tibane0 /README.md

Hello World

🔹 IT student passionate about binary exploitation, reverse engineering, malware development and low-level systems development | CTF player.
🔹 Aspiring Vulnerability Researcher and Exploit Developer.
🔹 Currently learning binary exploitation techniques and diving into kernel development & exploitation.


BLOG


Featured Projects

  • TibaneC2 → A custom red team Command & Control (C2) framework
    • Status: Under active development

Languages and Tools



Pinned Loading

  1. TibaneC2 TibaneC2 Public

    A lightweight, modular Command and Control (C2) framework built for offensive security research and red teaming (Post Exploitation).

    C 61 8

  2. 0xroadmap 0xroadmap Public

    Roadmap to learn binexp, rev, vr, and systems programming

  3. ctf-pwn ctf-pwn Public

    Solutions to binary exploitation (pwn) CTF challenges

    Python

  4. pwn-env pwn-env Public

    Docker environment for binary exploitation

    Dockerfile

AltStyle によって変換されたページ (->オリジナル) /