About Me


Hello, world;

0xflux

Welcome to my blog! I’m a semi-decent not bad programmer on a journey to become a red teamer, ethical hacker, and a malware (ethical) developer. This blog is where I’ll be sharing my experiences, learning out loud, and hopefully teaching a thing or two along the way. I have developed my own ‘malware’ and c2 framework, primarily built in Go and C++. Whilst I don’t want to open source the whole thing (for my own ethical reasons), I would like to share parts of it I think are cool, and even share upgrades (and the learning that came from it) to certain modules within my framework.

I’ve got a fairly decent background in programming (some professional, mostly hobby), but I’m diving deeper into the world of cybersecurity, like peeling away the layers of an onion (believe me, tears included).

This blog is my personal knowledge base, a place where I can keep track of my progress and share some cool stuff I’ve been working on. Whether you’re new to this field or you’ve been around the block a few times, I hope you’ll find something interesting or useful here.

Come check out my GitHub (https://github.com/0xflux/), where I take inspiration from content creators throughout the cyber world, and hopefully someday soon, I’ll have my own niche content to bring to the world.

My ultimate goal

I have two things in mind which this blog will help motivate me towards:

  1. To create the best red team framework ever. It’ll be so good, it’ll make your grandma want to learn Rust.

  2. To become a full time red-teamer in a professional capacity, improving security and defeating the bad guys.

Why rust I hear you ask? Well…. isn’t it obvious?!

rust

rust2

Any content posted here is for ethical purposes only, I do not condone the use of offensive cyber security for any purpose which breaks the law or harms others, and I do not condone or permit any user to take learning, or code samples from this blog, and use them for illegal or ethically questionable activity. This blog is strictly for educational purposes, and for the furthering of my own knowledge.

You may NOT under any circumstance use any code, theory, or information from my blog and use it in a manner which is illegal, unethical or that harms any living being. You may not use any code or information from this blog to do anything on a system that you do not have the full explicit permission of the system owner to do. I cannot be held responsible for the actions of others whom consume this information. I post these blogs specifically to help encourage and motivate people to learn offensive cyber security for the greater good of society and our cyber defences. I am also blogging to document my growth and to consolidate learning.

Why do I like offensive security? In my opinion it significantly enhances defensive security strategies over time. Think about it, offensive cyber provides invaluable insights into the mindset, techniques, and tools used by attackers, enabling us to anticipate and counteract potential threats more effectively. By understanding the vulnerabilities and attack vectors that the big bads exploit, we can proactively identify and fortify weaknesses in our systems before they are compromised. It also allows for the development of more robust and resilient security architectures, policies, and response protocols.