Cybersecurity hobbyist and compulsive tool builder. I learn by breaking things and automate everything that bores me. Archcraft daily driver, CTF addict, 86 repos deep with no signs of stopping. Not a professional — just someone who got way too into it.
|
🤖 droidB — Advanced Android device manager. Universal debloater (300+ packages), Samsung Odin4/Heimdall flashing, MTK SP Flash Tool support, ADB automation, full device backup (SMS, contacts, media, APKs), and a complete Android security testing module — Frida integration, APK analysis, TLS cert management, proxy/traffic interception, and more. Written in Bash. 🖼️ wallpimp — Cross-platform wallpaper manager. Hybrid Python + Go architecture: Python handles the CLI/tkinter GUI, a compiled Go engine handles all downloads via goroutines and a persistent socket. 19 curated sources, Unsplash integration, MD5 dedup, slideshow support across systemd/launchd/Task Scheduler. One-line install on all platforms. 🚩 CTFS — Purpose-built autopwn scripts for completed CTF rooms. Each script encodes the full exploitation chain end-to-end — recon → enum → shell → root — and runs hands-free. TryHackMe active (23 rooms and growing), HackTheBox incoming. |
🌿 gitnav — Browse GitHub repos from your terminal. Classic CLI menu or full-screen TUI. List/search repos, view stats, clone with live output, inspect issues and releases, render READMEs in-terminal, open any repo in browser. Written in Python. 🛠️ fetch-tools — Linux shell setup tool. Deploys 📡 server — Authenticated file sharing server in a single Go binary. Password-protected sessions, drag-and-drop upload, bulk download, directory tar streaming, optional TLS with self-signed cert generation, and an OpenVPN config generator. Clean dark web UI baked in. |
$ cat /etc/current-loadout
go 1.24 # primary build language
python 3.13 # scripting + tooling + AI
rust 1.78 # when go isn't low-level enough
c # when nothing else will do
bash 5.2 # glue that holds everything together
nmap 7.95 # old faithful
burpsuite 2025 # web companion
frida # dynamic instrumentation
wireshark 4 # packet whisperer
ollama # local llm runtime
┌──(0xb0rn3㉿archcraft)-[~/CTFS]
└─$ ls -la
drwxr-xr-x THM/ ← TryHackMe autopwn scripts (23 rooms + growing)
drwxr-xr-x HTB/ ← HackTheBox incoming
-rwxr-xr-x *.sh ← Standalone exploit scripts per room
-rw-r--r-- *.html ← Full writeups at oxborn3.com/CTF.html
└─$ cat STATUS
→ Probably pwning something right now.
