Skip to content
View egetones's full-sized avatar

Highlights

  • Pro

Block or report egetones

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
egetones/README.md

// echo "Hello World!"

"Data is the new oil. It's valuable, but if unrefined it cannot really be used."

Who am I? Just a tech enthusiast diving deep into the world of Cybersecurity, OSINT, and OpSec. I like keeping my digital footprint small and my systems secure. Currently exploring the depths of the Linux ecosystem with Fedora.

What I'm up to

  • Linux System Mastery: Daily driving Fedora Workstation. Focused on system hardening and living in the terminal.

  • OSINT & Forensics: Digging into open-source intelligence, data analysis, and file integrity techniques.

  • OpSec & Defense: Prioritizing privacy, anonymity, and security best practices, and building defensive tools.

  • System & Low-Level Programming (The "Why"):

    • C/C++: Gaining hands-on experience with Raw Sockets, Kernel Input Subsystem, and Memory Management for advanced system analysis. (ShadowSniff, SilentKey, Phantom)
    • Tool Development: Building PoCs for Binary Exploitation (StackSmash) and Defense Evasion (Rootkit) to better understand offensive architecture.
  • Scripting: Automating the routine with Bash and shell scripting.

Tech Stack & OS

         


Çrş 15 Nis 2026 22:15:29 +03

Pinned Loading

  1. Titan-Rootkit Titan-Rootkit Public

    Ring-0 Linux Kernel Module (LKM) Rootkit. Demonstrates Direct Kernel Object Manipulation (DKOM) techniques to manually unlink and hide the module from the OS registry (lsmod).

    C

  2. Needle Needle Public

    Advanced Linux Process Injector written in C++. Utilizes ptrace syscalls to attach to running processes, manipulate execution flow (RIP), and inject arbitrary shellcode directly into memory.

    C++

  3. phantom phantom Public

    C-based User-land Rootkit PoC implementing function hooking via LD_PRELOAD to hide processes from system monitors (ps, top).

    C 1

  4. SilentKey SilentKey Public

    Low-level C++ keylogger capturing raw keystrokes by interacting directly with the Linux Kernel Input Subsystem (/dev/input/).

    C++

  5. vortex-c2 vortex-c2 Public

    A sophisticated, multi-threaded Command & Control (C2) framework for Red Team simulation. Implements End-to-End AES-256 encryption to evade network analysis and maintain resilient communication wit…

    Python 1

  6. rootradar rootradar Public

    Blue Team Persistence Scanner. Audits critical Linux system paths (systemd, cron, .bashrc) to detect unauthorized startup hooks and potential malware footholds.

    Python