Skip to content
View BlackSnufkin's full-sized avatar
πŸ΄β€β˜ οΈ
On the way to conquer another goal
πŸ΄β€β˜ οΈ
On the way to conquer another goal

Block or report BlackSnufkin

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
BlackSnufkin/README.md
roles


🎯 Profile Overview

You have finally discovered my Github profile.
Please feel free to clone/fork projects, raise issues and submit PRs if you think something could be better.
Read my blog for write-ups and research - Happy Hacking! 😊

struct OffensiveOperator {
    handle: String,
    role: String,
    specialties: Vec<&str>,
    base_of_operations: String,
    primary_languages: Vec<&str>,
}

impl OffensiveOperator {
    fn new() -> Self {
        Self {
            handle: "BlackSnufkin".to_string(),
            role: "Red Team Operator".to_string(),
            specialties: vec!["Malware Development", "Reverse Engineering", "Evasion Techniques"],
            base_of_operations: "Initial Access Guild".to_string(),
            primary_languages: vec!["Rust", "C++", "Python"],
        }
    }
}

πŸ”’ TOP 10 OPSEC Principles of Red-Team Operator

# Core Principle
The most important matter in an operation is its security. Everything else must subordinate.
Carry out daily tasks with careful attention to details. It must be a habit.
Be thoughtful. Think before you do anything. Mistakes cannot, in principle, be undone.
Be ready for many scenarios. Don't count on luck or misfortune.
Question the assumptions. Check how their change or obsolescence affects the task.
Never get into a routine. Watch out for fatigue, stress, excitement, and overconfidence.
Know your constraints. When you lack knowledge or experience, get it.
Beware of anomalies. What you are doing must look like noise. Be invisible by being common.
Monitor your activities. Look at yourself through the eyes of your adversary.
Never underestimate your adversary. Assume he's better than you.

πŸ”₯ Active Projects

LitterBox BYOVD

πŸ“Š GitHub Analytics Git

BlackSnufkin's github activity graph


🌐 Connect & Collaborate

Interested in collaboration? Have a challenging research problem?
Open an issue or reach out directly - always happy to discuss Security sutff

   

Daily Motivation


Pinned Loading

  1. LitterBox LitterBox Public

    A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Integrates with LLM agents via MCP for enhanced analysis capabil…

    YARA 1.2k 133

  2. BYOVD BYOVD Public

    BYOVD research use cases featuring vulnerable driver discovery and reverse engineering methodology. (CVE-2025-52915, CVE-2025-1055,).

    Rust 413 66