root@not0day:~$

I am Not0Day

// Penetration Tester & Security Researcher

Exploiting vulnerabilities before adversaries do. Specializing in red team operations, web & network penetration testing, and CTF competitions. Dedicated to turning zero-days into not-a-problem.

HTB Academy Labs
CEH Certified
Python Security Tooling

Who is Not0Day?

Independent security researcher focused on offensive security and cryptographic integrity. Currently mastering the HTB CPTS methodology and developing custom security tools in Python. Certified Ethical Hacker (CEH) with a drive for automated integrity auditing.

CEH HTB Academy Labs Python Security Tooling
handle Not0Day
focus Offensive Security & Crypto Integrity
training HTB CPTS (Academy Labs)
cert CEH (Certified)
tooling Python (Security Tooling)
status Available for engagements

Technical Arsenal

Tools, techniques, and knowledge domains I operate with daily.

Offensive Security

  • Penetration Testing
  • Red Team Operations
  • Exploit Development
  • Privilege Escalation
  • Social Engineering
  • Post-Exploitation

Web Application Security

  • OWASP Top 10
  • SQL Injection
  • XSS / CSRF
  • SSRF / XXE
  • Authentication Bypass
  • API Security

Network Security

  • Network Reconnaissance
  • Man-in-the-Middle
  • ARP / DNS Spoofing
  • Firewall Evasion
  • VPN Analysis
  • Packet Analysis (Wireshark)

Tools & Platforms

  • Metasploit Framework
  • Burp Suite Pro
  • Nmap / Masscan
  • Cobalt Strike
  • BloodHound / SharpHound
  • Impacket / CrackMapExec

Languages & Scripting

  • Python (Tooling)
  • Bash/ZSH (Linux)
  • PowerShell (Windows)
  • JavaScript (Web)

Forensics & RE

  • Reverse Engineering
  • Malware Analysis
  • Binary Exploitation
  • Ghidra / IDA Pro
  • GDB / pwndbg
  • Digital Forensics

Featured Projects

Open-source tools and research I've built and published.

Hashing Utility

A Python-based cryptographic hashing utility for automated integrity checks and file verification. Supports multiple hash algorithms for security tooling workflows.

PythonCryptographySecurityIntegrity

AutoPwn Framework

Modular automated exploitation framework written in Python. Supports plugin-based architecture for custom exploit modules, post-exploitation automation, and report generation.

PythonExploitationAutomationOpen Source

WebRecon Toolkit

Comprehensive web application reconnaissance suite combining passive OSINT, active scanning, and vulnerability fingerprinting into a single CLI tool.

PythonOSINTWeb SecurityCLI

AD BloodHound Automation

Scripts and playbooks to automate Active Directory enumeration, BloodHound data collection, and attack path identification during red team assessments.

PowerShellActive DirectoryRed TeamBloodHound

CVE-2024-XXXX PoC

Proof-of-concept exploit for a critical authentication bypass vulnerability discovered through independent research. Responsibly disclosed and patched.

CVEExploitResponsible DisclosureC
archived

Phishing Infrastructure Toolkit

Red team phishing campaign setup automation: GoPhish deployment, domain categorization bypass, email template generation, and tracking dashboard.

GoRed TeamPhishingDocker

CTF Solver Toolkit

Collection of purpose-built scripts for rapid CTF challenge solving: crypto solvers, binary patchers, steg extractors, and web exploit templates.

PythonCTFCryptographyForensics

CTF Writeups

Selected challenge writeups and security research from competitions and independent work.

Get In Touch

Whether you're looking to hire a penetration tester, collaborate on security research, or discuss a responsible disclosure — my inbox is open. I respond to all serious enquiries.


For vulnerability reports, please use the PGP-encrypted channel or the secure contact form. For general enquiries, any channel works.