Skip to content
View escf1root's full-sized avatar
⚠️
This account is currently being investigated
⚠️
This account is currently being investigated

Block or report escf1root

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
escf1root/README.md

hacker-gif

Welcome to Escf1root Github!

About Me

I'm escf1root a curious web pentester, a relentless security explorer, and a self-taught digital faultfinder.

My journey isn’t about bragging rights or CVE counts. It’s about understanding how systems truly work and, more importantly, how they quietly fail. I dive into web applications not as an outsider, but as someone who thinks like both a developer and an attacker: tracing data flows, questioning assumptions, and probing the invisible boundaries between features and flaws.

I’m rooted in logic, but fueled by curiosity. That means I don’t just run scanners and call it a day. I read source code (when available), reverse-engineer API behaviors, map authentication flows, and hunt for those subtle, high impact bugs insecure direct object references (IDOR), or logic gaps in password reset mechanisms that automated tools almost always miss.

My philosophy? Break silently, learn deeply, fix meaningfully. I don’t exploit to cause chaos. I exploit to reveal truth. Every proof-of-concept I build, every vulnerability I document, is crafted with one goal: to show defenders exactly how an attacker would move, so they can patch not just the symptom, but the root cause.

And about tools I don’t treat them as black boxes. I study how Burp, Nuclei, or custom scripts think. I tweak them, extend them, or build my own from scratch because real offensive security isn’t about button-pushing. It’s about adapting, improvising, and outthinking the system you’re testing.

At my core, I believe security isn’t just a technical layer it’s a responsibility. I test systems to protect users, empower developers, and harden digital spaces especially for students, small businesses, and local platforms that often lack the resources to defend themselves.

This is more than a skill. It’s a mindset. And I’m here for the long hunt!.


🔧 What I Do

  • I work with testing web applications for security holes, ways to bypass authentication, and quirks that turn small flaws into big advantages.
  • Run friendly (but realistic) attacks on web platforms to see how well they hold up when real hackers come knocking.
  • Love chaining tiny issues into full account takeovers or data leaks because impact matters more than CVSS scores.
  • Mess with APIs, JWTs, hidden endpoints, and whatever the dev team forgot to lock down.
  • Build my own little hacking tools to automate the boring stuff and focus on the fun parts.
  • Always play fair: no wrecking systems, no keeping data just clear, honest findings that actually help.

Currently Building: Nulltrace

Nulltrace is a private post-exploitation research framework.
It focuses on encrypted payload delivery, stealth process injection, AI-driven mutation, and evasion techniques.

🧩 Function: Executes encrypted payloads directly in memory, bypasses analysis tools, and adapts to its environment.
🎯 Purpose: Built to study how modern defenses react and how silence can be weaponized to bypass them.


👨🏻‍💻  Arsenal I Operate With

Burp Suite Metasploit Wireshark Acunetix Invicti Python C C++ JavaScript Kali Linux Parrot OS BlackArch Debian Ubuntu Bash VS Code Git AI like ChatGPT


📈 Some GitHub Stats

GitHub Stats Top Languages

Pinned Loading

  1. scando scando Public

    ⚡ Parallel subdomain enumeration framework with modular collectors, multi-source aggregation, and clean result merging.

    Shell 5 2

  2. recon-wizard recon-wizard Public

    ⚡ Automated recon framework using modern web reconnaissance techniques 🔍 Subdomain enumeration, crawling, URL normalization & vulnerability template scanning 📱 Built for Termux and Linux

    Python 4