Skip to content
View 0romos's full-sized avatar
Block or Report

Block or report 0romos

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
0romos/README.md

Tables of Contents

  • 1.0 About Me
  • 2.0 EDV

1.0 About me

I am oromos, 19 years old, currently majoring in Cyber Security, Computer/Data Science, Machine Learning, Software Engineering, and Robotics. My aspiration is to work at organizations like the NSA or IC3 as a Security Researcher and at companies like Google, Facebook, or Apple as a Security researcher. I am constantly engaged in new projects, regardless of their level of difficulty and frequently generate fresh ideas for my work.

Presently, my focus lies in low-level development and participation in Capture The Flag and King Of The Hill events, essentially anything related to low-level development and hacking. Over the past five years, I have participated in various Bug Bounties for numerous companies, where I’ve discovered and reported bugs, exploits, and 0days for platforms such as Discord, Instagram, Sleek, Twitter, Lieferando, OBS, and even government websites. Some proof of concepts and exploits can be found on my YouTube channel and Github repositories. Additionally, I have participated in several cybersecurity events throughout my journey.

I am always on the lookout for new projects to work on and new collaborators. Feel free to check out my repositories, and don’t hesitate to reach out if you would like to collaborate on any of my existing projects or if you think I would be a good fit for your project. I appreciate every piece of information I receive and am always eager to learn about things I don’t know.

2.0 EDV

I have lot of experience in the field of Cyber Security and I have worked on many different Projects through out the Years(2015-2024).

  - Computer Science       -> Fictional Timetableing System, OCR, FR-CCTV - (Face Recognition AI)
  - Data Science           -> Sentiment Analysis, Natural Language Processing, Machine Learning
  - Software Engineering   -> Web Browser Development, Android Development, iOS Development
  - Machine Learning       -> Neural Networks, Deep Learning, Reinforcement Learning
  - Robotic                -> Robotic Arm, Robotic Head, Robotic Leg, Robotic Hand
  - Hacking                -> Penetration Testing, Vulnerability Analysis
                           -> Reversing, Low Level Hacking - ( Kernel, ...)
                           -> Web Exploitation, Hardware Hacking - (Wallet, USB, INP Devices)
                           -> Bug Hunting, IOT Hacking, Binary Exploitation, Car Hacking - (sort of?)
  - Cyber Security         -> Vulnerability Analysis
  - Cryptography           -> Cryptography, Encryption, Decryption
  - Networking             -> Networking, Network Security, Network Monitoring, VPNS, Packet Poisoning
  - Hardware               -> Embedded Systems, Hardware Security
  - Low Level              -> Operating System, Bootloader, DCA, Chipsets, MBU, Motherboards - (Fail)
  - Fullstack, Dev Ops     -> Exploitation - (modules) Website, Blog, Portofolio, Databases
  - MS-PowerPoint          -> Presentations, Slides, Animations
  - MS-Excel               -> Spreadsheets, Tables, Charts
  - MS-Word                -> Documents, Pages, Presentations
  - MS-Access              -> Access Databases, Access Forms

Pinned Loading

  1. CVE-2020-14179 CVE-2020-14179 Public

    𓃌 - Atlassian Jira Information Disclosure SLA & Field names

    Python 1

  2. CVE-2022-35914 CVE-2022-35914 Public

    𓃌 - htmlLawed 1.2.5 Remote code Execution

    Python

  3. FirebaseMissconfExploit FirebaseMissconfExploit Public

    𓃌 - Exploit miss configured Firebase Databases

    Python

  4. Axer Axer Public

    𓃌 - Exploit faster with simplicity and ease using Axer

    Python 40 4

  5. DiscGate DiscGate Public

    𓃌 - Capture Discord opcodes with ease.

    Python

  6. VTableInterop VTableInterop Public

    𓃌 - ARM to x86 VTABLE translator

    C 2