Skip to content
View 0xMarcio's full-sized avatar

Block or report 0xMarcio

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
0xMarcio/README.md

Exploit Code, Not People! πŸ’₯

Welcome to my GitHub! I’m passionate about automation, offensive security, and exploiting code vulnerabilities without user interaction. My work focuses on building tools and workflows that simplify vulnerability discovery and enhance security workflows.

πŸš€ About Me

  • πŸ’» Application Security Analyst specializing in code-first vulnerabilities, including SQL Injection (SQLi), Firewall Bypasses, and AV Evasion.
  • πŸ› οΈ Proficient in Bash scripting, Python, PHP, Go, C, and UNIX tools. I believe in code quality and automation to improve efficiency and workflow.
  • πŸ” Exploit Code: My focus is on technical vulnerabilities that do not rely on user interaction.

πŸ† Achievements

  • Submitted ~2500 vulnerabilities across platforms like BugCrowd, Invicti, HackerOne and Open Bug Bounty.
  • Contributed to fixing over 130 vulnerabilities in various bug bounty programs.
  • Ranked in the Top 25 on the Hack The Box leaderboard, demonstrating my capability in CTF and red teaming exercises.

πŸ› οΈ Tech & Tools I Use

  • Languages & Tools: C, Python, Go, SQL, Docker, Bash one-liners πŸ’™
  • Security Tools: BurpSuite, Nmap, Zap, SqlMap, wapiti, the ProjectDiscovery arsenal, and my personal Toolbelt
  • Automation & Data Parsing: I use Trickest for workflow automation, and ElasticSearch for handling large datasets.
  • CTF & Red Teaming: Regular participant in Capture The Flag events, focusing on red teaming and offensive security challenges.

πŸ›‘οΈ Automation & other "Quality of Life" stuff I’ve Built

  • Security Tools Collection: A platform that aggregates the latest security tools and auto-renders their GitHub READMEs for streamlined access.
  • Exploit Database: Automatically pulls and organizes exploits from PacketStorm’s RSS feed, providing immediate access to newly released exploits.
  • CVE POC Locator: Offers fast, fuzzy text searches across the entire CVE dataset, allowing for millisecond response times on CVE lookups. This tool improves vulnerability research by enhancing speed and accuracy.

🌍 Contact Info


github-snake

Pinned Loading

  1. forgekit forgekit Public

    A collection of handy tools for data handling, visualization, and reporting

    Python

  2. WebWader WebWader Public

    Just another python crawler for OSINT

    Python

  3. BeyondTheBlackboard BeyondTheBlackboard Public

    Collection of Python scripts dedicated to exploring, simulating, and solving complex problems in physics

    Python

  4. cve cve Public

    Latest CVEs with their Proof of Concept exploits.

    Python 11 2