Skip to content
View tibane0's full-sized avatar

Block or report tibane0

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
tibane0/README.md

Hi, I'm Nkateko Tibane

🔹 IT student passionate about binary exploitation, reverse engineering, and low-level systems development.
🔹 Aspiring Vulnerability Researcher and Exploit Developer.
🔹 Currently learning binary exploitation techniques and diving into kernel development & exploitation.


Featured Projects

  • TibaneC2 → A custom red team Command & Control (C2) framework
    • Status: Under active development
  • Binary Exploitation CTF Writeups - Writeups and solutions for binary exploitation (pwn) ctf challenges I solved

Languages and Tools



Pinned Loading

  1. TibaneC2 TibaneC2 Public

    A lightweight, modular Command and Control (C2) framework built for offensive security research and red teaming (Post Exploitation).

    C 11

  2. ctf-pwn ctf-pwn Public

    Solutions to binary exploitation (pwn) CTF challenges

    Python

  3. pwn-env pwn-env Public

    Docker environment for binary exploitation

    Dockerfile

  4. exploit-dev exploit-dev Public

    Portfolio of exploit development projects including binary exploitation, shellcoding, kernel exploitation, and vulnerability research.

    C

  5. tibane0.github.io tibane0.github.io Public

    personal blog and portfolio, where I document my journey through offensive security, vulnerability research, and technical exploration.

    Shell

  6. offensive-security-Playground offensive-security-Playground Public

    experimental hacking playground

    Shell