Skip to content
View BlackSnufkin's full-sized avatar
πŸ΄β€β˜ οΈ
On the way to conquer another goal
πŸ΄β€β˜ οΈ
On the way to conquer another goal

Block or report BlackSnufkin

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
BlackSnufkin/README.md
roles


🎯 Profile Overview

You have finally discovered my Github profile.
Please feel free to clone/fork projects, raise issues and submit PRs if you think something could be better.
Read my blog for write-ups and research - Happy Hacking! 😊

struct OffensiveOperator {
    handle: String,
    role: String,
    specialties: Vec<&str>,
    base_of_operations: String,
    primary_languages: Vec<&str>,
}

impl OffensiveOperator {
    fn new() -> Self {
        Self {
            handle: "BlackSnufkin".to_string(),
            role: "Red Team Operator".to_string(),
            specialties: vec!["Malware Development", "Reverse Engineering", "Evasion Techniques"],
            base_of_operations: "Initial Access Guild".to_string(),
            primary_languages: vec!["Rust", "C++", "Python"],
        }
    }
}

πŸ”’ TOP 10 OPSEC Principles of Red-Team Operator

# Core Principle
The most important matter in an operation is its security. Everything else must subordinate.
Carry out daily tasks with careful attention to details. It must be a habit.
Be thoughtful. Think before you do anything. Mistakes cannot, in principle, be undone.
Be ready for many scenarios. Don't count on luck or misfortune.
Question the assumptions. Check how their change or obsolescence affects the task.
Never get into a routine. Watch out for fatigue, stress, excitement, and overconfidence.
Know your constraints. When you lack knowledge or experience, get it.
Beware of anomalies. What you are doing must look like noise. Be invisible by being common.
Monitor your activities. Look at yourself through the eyes of your adversary.
Never underestimate your adversary. Assume he's better than you.

πŸ”₯ Active Projects

LitterBox BYOVD

πŸ“Š GitHub Analytics Git

BlackSnufkin's github activity graph


🌐 Connect & Collaborate

Interested in collaboration? Have a challenging research problem?
Open an issue or reach out directly - always happy to discuss Security sutff

   

Daily Motivation


Pinned Loading

  1. LitterBox LitterBox Public

    A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Integrates with LLM agents via MCP for enhanced analysis capabil…

    YARA 1.1k 123

  2. NyxInvoke NyxInvoke Public

    NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-build support

    Rust 226 30

  3. BYOVD BYOVD Public

    BYOVD research use cases featuring vulnerable driver discovery and reverse engineering methodology. (CVE-2025-52915, CVE-2025-1055,).

    Rust 358 58

  4. Rusty-Playground Rusty-Playground Public

    Some Rust program I wrote while learning Malware Development

    Rust 144 11