Skip to content
View 0xInitZer0's full-sized avatar
😏
😏
  • USA
  • 08:09 (UTC -12:00)

Block or report 0xInitZer0

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
0xInitZer0/README.md
                               ╔════════════════════════════════════════════════════════════════╗
                               ║           ⚠️  MALWARE ANALYST | INFOSEC SPECIALIST ⚠️         ║
                               ║                      >> InitZer0 <<                            ║
                               ╚════════════════════════════════════════════════════════════════╝

🎯 InitZer0 — Malware Analyst & Security Researcher

Status Threat Level Security

> Reverse Engineer | CTF Competitor | Malware Analyst

🔐 Belarus | 2 Years XP | Specialized in Malware Analysis


💻 SYSTEM PROFILE

┌──────────────────────────────────────────────────────────────┐
│ >> INITIALIZING OPERATOR PROFILE...                          │
├──────────────────────────────────────────────────────────────┤
│ [✓] CALL_SIGN: InitZer0                                      │
│ [✓] ROLE: Malware Analyst & Security Researcher              │
│ [✓] EXPERIENCE: 2 years Information Security                 │
│ [✓] LOCATION: Minsk, Belarus                                 │
│ [✓] STATUS: Inactive                                         │
└──────────────────────────────────────────────────────────────┘

🧠 ABOUT ME

A dedicated Malware Analyst on a mission to dissect, understand, and combat sophisticated malware. My expertise spans:

  • 🔬 Static & Dynamic Analysis — IDA Pro, Ghidra, x64dbg...
  • ⚙️ Reverse Engineering — Binary decompilation, protocol analysis, vulnerability research
  • 🎪 CTF Mastery — RE, Web Security, Infra
  • 🛡️ Defensive Security — Vulnerability assessment

I operate in controlled lab environments (FlareVM, Kali Linux, CAPEv2) to safely analyze threats while contributing to the security community.


⚔️ ARSENAL — Technical Skills

Core Programming Languages

C C++ Python Assembly Bash PowerShell

Specialized Tools & Platforms

🔧 CATEGORY 📦 TOOLS
Virtualization VMware (FlareVM, Kali Linux, CAPEv2)
Reverse Engineering IDA Pro • Ghidra • x64dbg • Radare2
Analysis & Monitoring Wireshark • API Monitor • Process Hacker
Exploitation pwntools • Metasploit • Burp Suite
Low-Level Debugging NASM • GDB • WinDbg • Binary Patching

🏆 CTF PLATFORMS & ACHIEVEMENTS

BugMakers CTF HackTheBox TryHackMe HackerLab

CTF Stats: Actively competing across multiple platforms, specializing in Reverse Engineering, Web, Infra and Crypto challenges.


📊 SYSTEM MONITORING

GitHub Analytics

GitHub Stats

Programming Languages Distribution

Top Languages

Commit Activity Streak

GitHub Streak

Repository Stats

Contribution Graph


🔗 COMMUNICATION CHANNELS

Email Telegram


💰 SUPPORT ME

If my research and tools have helped you, consider supporting my work (FAKE LINK):

PayPal

Your support helps me conduct deeper research and contribute more to the security community.


🏅 CERTIFICATIONS & ACHIEVEMENTS

Certifications & Diplomas

Diploma 1
Certification #1
Year
Diploma 2
Certification #2
Year
Diploma 3
Certification #3
Year

Achievements & Awards

🥇 Top Achiever — Certificate Link 🥈 Advanced Researcher — Certificate Link 🥉 Security Expert — Certificate Link

Competition Highlights

🎯 Event 📅 Date 🏆 Result
LATER 2024 Top 10
LATER 2024 Winner
LATER 2023 Participant

Pinned Loading

  1. BypassFilter BypassFilter Public

    It is an automated Linux tool for finding vulnerabilities in web applications related to incorrect processing;

    Shell

  2. ShellWeaver ShellWeaver Public

    Python 3