Skip to content
View zoecyber001's full-sized avatar
πŸ’­
Vibe coding
πŸ’­
Vibe coding

Highlights

  • Pro

Block or report zoecyber001

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
zoecyber001/README.md
Typing SVG

[!] WARNING: AUTHORIZED PERSONNEL ONLY // 2026_PROTOCOL_ACTIVE


πŸ“‘ SYSTEM KERNEL: ONLINE

// ZoeCyber_Kernel_v2.0 loaded...
// > Reading operator profile from memory address 0xDEADBEEF...

struct Operator {
    char* alias = "ZoeCyber";
    char* class = "Reverse Engineer | Hardware Hacker | Pentester";
    char* focus = "Offensive Research & Critical Infrastructure";
    bool is_dangerous = true;
};

void main() {
    printf("Initializing connection to SCADA Lab...\n");
    printf("Bypassing firewalls...\n");
    // [β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ] 100% ACCESS GRANTED
}

πŸ›  WEAPONRY (THE STACK)

OFFENSIVE INFRASTRUCTURE HARDWARE
Metasploit Docker Flipper
Ghidra Linux ESP32
Burp Python SDR

πŸ“‚ CLASSIFIED FILES (Click to Declassify)

ACCESS_FILE: PROJECT_GRIDZERO.txt
Type: Critical Infrastructure Simulation (ICS/OT)
Architecture: Docker Microservices, Python Flask, Modbus Protocol.
Objective: Simulating a West African National Grid collapse via SCADA exploitation.
Status: [ACTIVE] - Building the "Kill Packet" logic.
ACCESS_FILE: HARDWARE_RE_AUDITOR.bin
Type: Embedded Reverse Engineering & Hardware Hacking
Tools: Ghidra, UART/JTAG, Logic Analyzers.
Scope: Dumping firmware from IoT devices and analyzing RF protocols (433MHz).
Status: [RESEARCHING]
ACCESS_FILE: MALWARE_DEV_LABS.exe
Type: Advanced Pentesting & Malware Development
Focus: Writing custom payloads in C/Assembly.
Technique: EDR Evasion, Process Injection, Rootkit analysis.
Status: [CLASSIFIED]

πŸ“Ÿ ENCRYPTED COMMS

root@zoecyber:~$ shutdown -h now_

Pinned Loading

  1. assembly-annotator assembly-annotator Public

    Python 4

  2. SCENARIO SCENARIO Public

    Get the scripts used in every SCENARIO episodes

    Python 2

  3. soubi soubi Public

    JavaScript 7

  4. ghost-shell ghost-shell Public

    Python 4 1