Skip to content
View Dx3One's full-sized avatar

Block or report Dx3One

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Dx3One/README.md

👋 Hi, I’m @Dx3One

IT‑Security • Bug‑Hunter • Malware‑Forensics Enthusiast


📜 Was ich tue 🤖

Status Aktuelles Projekt / Fokus
Bug Hunting & Malware Forensics Analyse von Exploits, Reverse‑Engineering von Schadsoftware und Veröffentlichung von Lessons Learned.
Tool Development Eigenentwickelte Bash/Python/Go Skripte für automatisierte Sicherheitstests, die ich in der Community teile.
Open Source Contributions Aktive Teilnahme an Projekten.
Mobile Pentesting & Web3 Lernen von Android/iOS Exploit‑Entwicklung und Smart‑Contract Audits.

🚀 Road‑Map: Cybersecurity Specialist → Offensive Security Engineer


🛠️ Skills & Knowledge

Burp Suite | Metasploit | Wireshark
Bash | Python | Go | JavaScript | React
Linux (Debian, Arch) | Docker | Git | Debian Packages
Mobile Pentesting | Malware Forensics | Bug Hunting

Wenn du mehr über OSINT wissen willst – schreib mir! 😊


🎯 Ziele & Lernreise

  • Mobile Pentesting – Android‑Reverse Engineering
  • Bug Hunting – Teilnahme an CTFs, Bug Bounty‑Programmen (HackerOne, Bugcrowd).

Lerne jeden Tag etwas Neues – IT‑Security ist mein Lebenslauf!


📬 Kontakt

Medium Link
GitHub https://github.com/Dx3One
Twitter https://twitter.com/Dx3One
Discord Dx3One (DM für Zusammenarbeit)

🚀 Let’s Hack Responsibly!

👨‍💻  I’m learning anything that helps me become a Cybersecurity Specialist
📚  Writing tools for myself and my community
🛠️  Contributing to open‑source security projects
🌱  Currently exploring mobile pentesting & Web3

"Security is an ongoing journey, not a destination." – Stay curious, stay safe!


Pinned Loading

  1. NucleiFuzzer NucleiFuzzer Public

    Forked from 0xKayala/NucleiFuzzer

    NucleiFuzzer is a Powerful Automation tool for detecting XSS, SQLi, SSRF, Open-Redirect, etc.. Vulnerabilities in Web Applications

    Shell

  2. proxmark3 proxmark3 Public

    Forked from RfidResearchGroup/proxmark3

    Iceman Fork - Proxmark3

    C

  3. mochabyte0x/CTFPacker mochabyte0x/CTFPacker Public

    Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !

    C 109 19

  4. bridge-spoof bridge-spoof Public

    bridge‑spoof – Dein interaktives 802.1X‑Testwerkzeug

    Python

  5. hexstrike-openwebui hexstrike-openwebui Public

    This Tool is for easy use HexStrike-Ai with OpenWebUI

    Python 3