+ 𝕮𝖗𝖆𝖋𝖙𝖎𝖓𝖌 𝖍𝖞𝖕𝖊𝖗𝖛𝖎𝖘𝖔𝖗𝖘 𝖎𝖓 𝕮₁₀𝕳₁₅𝕹 ⚗️ & ⟨0x95⟩ 🔣
! 𝕭𝖆𝖗𝖊-𝖒𝖊𝖙𝖆𝖑 𝖘𝖊𝖌𝖋𝖆𝖚𝖑𝖙𝖘 𝖔𝖓𝖑𝖞 ⚡🖲️
# 𝕭𝖗𝖊𝖜𝖎𝖓𝖌 𝖍𝖊𝖎𝖘𝖊𝖍_𝕺𝕾 🌀 @0x95 (149.23 𝕸𝖔𝖑𝖆𝖗 𝕸𝖆𝖘𝖘)
- 𝕰𝖗𝖗𝖔𝖗 404: 𝖁𝖆𝖓𝖎𝖘𝖍𝖎𝖓𝖌 𝖆𝖈𝖙𝖘 𝖎𝖓 𝖐𝖊𝖗𝖓𝖊𝖑 𝖘𝖕𝖆𝖈𝖊
📈 Kernel Panic Stats
🛠️ Tech Grimoire
⚙️ Core Alchemy
- **0xDEADCODE** - Rewriting `/dev/null` in hex
- **Kernel Panic Fuel** - C++ template metaprogramming that segfaults on sight
- **Syscall Roulette** - Russian轮盘赌 with `fork()`
- **Void Pointers Anonymous** - Support group for dereferencing addicts
☢️ Virtualization Arsenal
- **Hypervisor of Chaos** - QEMU patch that randomizes CPUID
- **KVM Blue Sky** - Injecting meth formulas into VM entropy pools
- **Docker of Despair** - Images that `rm -rf /*` on `docker stop`
- **K8s Reaper** - CronJob that deletes namespaces at midnight
💀 Memory Corruption Kit
- **GDB Black Magic** - Breakpoints that trigger triple faults
- **Radare2 Hexorcist** - Disassembling binaries into I Ching hexagrams
- **LLDB Ouija Board** - Communicating with dead processes
- **Stack Smashing for Dummies** - Buffer overflow coloring book
## 🔮 Dark Contributions
<details>
<summary><b>🕳️ Void Whisperer Projects</b></summary>
- **Phantom Kernel**
`C++` `LLVM` `QEMU`
_Bare-metal hypervisor that leaves no trace in memory_
- **0xDEADCODE Compiler**
`Rust` `WASM` `Lua`
_Transpiles code into "vanishing bytecode" that self-destructs after execution_
- **Cryptic.Torrent**
`Python` `libp2p` `AES-NI`
_Distributed knowledge repository that evaporates after 404 seconds_
👻 Memory Phantoms
- **GDB Necromancer**
`GDB Python API` `ptrace` `DWARF`
_Revives core dumps into zombie processes_
- **Radare2 Sigils**
`Radare2` `Capstone` `Unicorn`
_Reverse engineers binaries into occult assembly patterns_
- **Stack Ouija**
`C` `ASAN` `KASAN`
_Communicates with dead stack frames through buffer overflows_
🌀 Hypervisor Hexes



- **KVM Curse** - _Inject blue screens into guest VMs_
- **Xen Shadow** - _Hide processes in negative dimension_
- **QEMU Soulbind** - _Tether VMs to dying host processes_
🧪 Cryptic Languages
```hex
Offset 0 1 2 3 4 5 6 7 8 9 A B C D E F
00000000 7f 45 4c 46 02 01 01 00 00 00 00 00 00 00 00 00
00000010 02 00 3e 00 01 00 00 00 78 00 40 00 00 00 00 00
ELF header incantation written in raw hex
Language Purpose Danger Level
BaneC Memory corruption liturgy ☠️☠️☠️☠️
Rustigo Unsafe possession rituals ☠️☠️☠️
Pythonomicon Scripted reality bending ☠️☠️
🕸️ Shadow Protocols / 🌑 Network Necromancy
- **Packet Séance**
`WireShark` `tcpdump` `libpcap`
_Summoning deceased TCP sessions from network purgatory_
- **DNS Blood Magic**
`Bind9` `dnsmasq` `PowerDNS`
_Resolving .onion domains through sacrificial DNS queries_
- **HTTP 666 Gateway**
`Nginx` `Lua` `OpenResty`
_Serving forbidden content with self-destructing cookies_

🔐 Cryptic Ciphers / 🦠 Cryptographic Plagues
```python
# ROT-666 cipher implementation
def rot666(text):
return bytes([(c + 666) % 256 for c in text.encode()])
print(rot666("Segmentation fault (core dumped)"))
Cipher Tools Effect
Soulbound OpenSSL, NaCl Keys that die with owner
Thanatos AES-NI, TPM 2.0 Self-decrypting ephemeral
Necrohash SHA-3, RIPEMD-160 Revives hashes from graves
👁️ Virtual Machine Oracles / 🌀 Spectre Hypervisors
KVM Geist
Virtual machines that run on dead CPU cores
qemu-system-x86_64 -enable-kvm -cpu necro,+sep
VirtualBox Phantasm
VM snapshots that haunt host memory
VBoxManage internalcommands creategost --name Specter
VMware Revenant
Zombie VMs that resurrect after deletion
vmware-x --net.pact-with-devil=true
🩸 Ominous Toolchain / ⚰️ Assembly Necrodancy
; x86_64 Death Incantation
section .text
global _start
_start:
mov rax, 60 ; sys_exit
mov rdi, 0xDEAD ; exit code
syscall
Tool Purpose Danger Level
GDB Voodoo Debugging parallel realities ☠️☠️☠️☠️
Hex Fiend Binary soul manipulation ☠️☠️☠️
Radare2 Ouija Communicating with dead code ☠️☠️☠️☠️
💾 Cursed Filesystems
Ext4 Damnation
debugfs e2fsprogs
Filesystem where deleted files haunt inodes
ZFS Abyss
zpool OpenZFS
Storage pools that consume adjacent disks
Btrfs Limbo
btrfs-progs
Snapshots trapped between COW realities
Filesystem Shell
Want me to conjure more dark tech elements? I can add:
- 🧟 CI/CD Necromancy pipelines
- 🔥 Database infernos
- 🌑 AI summoning circles
<!---
0x95404/0x95404 is a ✨ special ✨ repository because its `README.md` (this file) appears on your GitHub profile.
You can click the Preview link to take a look at your changes.
--->
🌴
On vacation
Crafting hypervisors in C₁₀H₁₅N ⚗️ & ⟨0x95⟩ 🔣
Bare-metal segfaults only ⚡🖲️
Brewing 𝖧𝖤𝖨𝖘𝖊𝖍_𝗢𝗦 🌀 @0x95
Error 404 / Vanishing acts in kernel
- Pluto
-
19:47
(UTC -11:00)
Popular repositories Loading
-
-
Publications
Publications PublicForked from abazhaniuk/Publications
Slides, Papers, Links to CVEs and advisories
-
EVTX-ETW-Resources
EVTX-ETW-Resources PublicForked from nasbench/EVTX-ETW-Resources
Tracing Multiple
Python
-
Something went wrong, please refresh the page to try again.
If the problem persists, check the GitHub status page or contact support.
If the problem persists, check the GitHub status page or contact support.