[ About Me ]

> Cybersecurity specialist passionate about offensive security, cryptography, and creating challenging educational experiences in the digital realm. _

$ whoami |

I'm zer0x64, a cybersecurity specialist with a deep passion for understanding and exploiting the complex vulnerabilities that exist within modern systems. My expertise spans across multiple domains of security, with particular specialization in offensive security techniques, cryptographic systems, and memory exploitation.

What drives me is the continuous challenge of staying ahead in the ever-evolving landscape of cybersecurity. Every system has weaknesses, and finding them requires a combination of technical knowledge, creativity, and persistence.

// Core philosophy:
while(system.isSecure == false) {
  exploit();
  learn();
  evolve();
}

0x01 → Offensive Security

Penetration testing, red team operations, and advanced attack techniques. I specialize in finding creative ways to bypass security measures and demonstrate real-world attack scenarios.

# exploit --payload reverse_shell

0x02 → Cryptography

Deep understanding of cryptographic protocols, implementation flaws, and attack vectors. From classical ciphers to modern post-quantum cryptography, I analyze and break cryptographic systems.

# sage crack_rsa.sage

0x03 → Memory Exploitation

Binary exploitation, buffer overflows, ROP/JOP chains, and advanced memory corruption techniques. I specialize in turning memory bugs into reliable exploits.

# ./pwn --rop chain.txt

NorthSec CTF CLASSIFIED

As a challenge designer for NorthSec CTF, I have the privilege of contributing to one of the largest in-person hacking competitions in the world. This event brings together hundreds of cybersecurity enthusiasts, professionals, and students for an intense weekend of problem-solving and learning.

My role involves creating challenging, educational, and engaging security puzzles that test participants' skills across various domains. From cryptographic challenges that require deep mathematical understanding to complex binary exploitation problems that demand creative thinking, I design challenges that push competitors to their limits.

What I find most rewarding about this work is seeing participants learn and grow through the challenges. Each puzzle is carefully crafted not just to test existing knowledge, but to teach new concepts and techniques that participants can apply in their cybersecurity careers.

// Challenge Statistics:
pwn_challenges: 15+
crypto_challenges: 10+
difficulty: EXTREME
tears_shed: COUNTLESS

My Approach PHILOSOPHY.exe

I believe that cybersecurity is fundamentally about understanding systems at their deepest level. To defend effectively, you must think like an attacker. To attack successfully, you must understand defensive measures. This duality drives everything I do.

My methodology combines theoretical knowledge with hands-on experimentation. I don't just read about vulnerabilities – I implement them, exploit them, and then work to understand how they can be prevented.

Through sharing knowledge via CTF challenges, blog posts, and open-source projects, I aim to contribute to a stronger, more educated cybersecurity community. Security through obscurity is no security at all – real security comes from understanding.

$ cat /etc/hacker_manifesto
"We explore... and you call us criminals.
We seek after knowledge... and you call us criminals.
We exist without skin color, without nationality,
without religious bias... and you call us criminals."
- The Mentor, 1986

> ./contact.sh |

Interested in collaboration, have questions about cybersecurity,
or want to discuss CTF challenge design?

zer0x64@cyberspace:~$ _