update whoami

This commit is contained in:
2025-08-27 22:13:14 +03:00
parent fa82805646
commit 0b74aec7f2

View File

@@ -25,71 +25,96 @@
<main> <main>
<section class="markdown-container"> <section class="markdown-container">
<img src="../pfp.jpg" class="align-to-right" alt="elleoma" width="200" /> <img src="pfp.jpg" class="align-to-right" alt="elleoma" width="200" />
<p>Im a Ukrainian student and a unix/linux & open-source enthusiast, trying to get into cybersecurity, gain <p>Im a Ukrainian student and a unix/linux &amp; open-source enthusiast</p>
some practical skills.</p> <p>Specialized in Cybersecurity, Penetration Testing, Red-Teaming, Bug-Bounty hunting</p>
<h2>My skills are:</h2> <h2>My skills are:</h2>
<ul> <ul>
<li>Cybersecurity</li> <li>Cybersecurity</li>
<li>Penetration testing</li> <li>Penetration testing</li>
<li>Low-level programming: C, Rust, Assembly (RISC-V, x86-64), C++, Zig</li> <li>Low-level programming: C/C++, Assembly (RISC-V, x86-64, ARM), </li>
<li>Malware analysis/development</li>
<li>Reverse engineering (IDA, Ghidra, Binary Ninja)</li>
<li>Self-hosting</li> <li>Self-hosting</li>
<li>Malware developmnet</li> <li>DevOps</li>
<li>Reverse engineering (IDA, Ghidra, NinjaBinary)</li> <li>A little bit of 3D (Blender)</li>
<li>A little bit of 3D</li> <li>A little bit of game development (Unity, UE5)</li>
<li>A little bit of game development</li>
</ul> </ul>
<hr /> <hr />
<h2>Some projects I have</h2>
<h2><a class="post-title" href="https://github.com/elleoma/facinus" target="_blank">Facinus</a></h2>
<p>Since our college switched from Windows to Ubuntu, I had a cool idea to remotely control my classroom PCs.
</p>
<p>I discovered <a href="https://gsocket.io/" target="_blank">gsocket.io</a> and started developing a tool that deploys a local web admin panel to
collect logs from connected clients.</p>
<p>I used an Ubuntu VM in QEMU and Bash scripted everything with some help of AI.</p>
<h3>OS-in-1000-lines</h3>
<p><a class="post-title" href="https://github.com/elleoma/os-in-1000-lines" target="_blank">OS Repo</a></h2>
<p>My implementation of <a href="https://operating-system-in-1000-lines.vercel.app/en">Operating System in 1000 lines</a> by <a href="https://www.shuwasystem.co.jp/author/a269003.html">Shinya Yanagita.</a></p>
<p>A small operating system written from scratch for RISC-V CPU architecture.</p>
<p>This project will have basic context switching, paging, user mode, a command-line shell, a disk device driver, and file read/write operations in C.</p>
<p>And also I'll try to add some more functionality to it.</p>
<p>Right now I'm still working on basic stuff before implementing something new.</p>
<p>I'm still learning C and Assembly, the RISC-V instruction set is new to me.</p>
<hr />
<h2>Cybersecurity</h2> <h2>Cybersecurity</h2>
<p>Ive been into cybersecurity for about 2 years now. I started with the normie setup — Kali Linux <p>Ive been into cybersecurity for about 2 years now. I started with the normie setup — Kali Linux
dual-booted next to Windows, learning through trial and error.</p> dual-booted next to Windows, learning through trial and error.</p>
<p>Eventually I spent more time on Linux, moved to KDE, configured everything myself, riced my terminal. Later <p>Eventually I spent more time on Linux, moved to KDE, configured everything myself, riced my terminal. Later
switched to Arch and Hyprland.</p> switched to Arch and Hyprland.</p>
<p>I still have lots to learn, and Id love to document all the tools and techniques I come across.</p> <p>Have experience with web penetration testing as well as Red Teaming in general</p>
<p>Know and use in practice many different tools/tecniques for tests, favorite ones: </p>
<ul>
<li>Reconnaissance: ffuf, subfinder, httpx</li>
<li>Web pentest: Burp Suite (OWASP ZAP), dalfom, curl, intersect, manual scripting (with python)</li>
<li>Lateral movement: impacket (windows), linpeas.sh (linux), bloodhound, netcat, chisel and maany-many more.</li>
<li>Reverse engineering &amp; Binary exploitation: mainly Ghidra, IDA Pro, strace, strings, gdb etc.</li>
<li>Persistence: gsocket, segfault (thc.org), process hiding etc.</li>
</ul>
<p>There's still big room to improve since there's insane amount of different fields to explore and that's what I'm trying to do.</p>
<h3>HackTheBox</h3> <h3>HackTheBox</h3>
<h4><a class="post-title" href="https://app.hackthebox.com/profile/1915061" target="_blank">My HTB profile</a></h4> <h4><a class="post-title" href="https://app.hackthebox.com/profile/1915061" target="_blank">My HTB profile</a></h4>
<p>HTB gave me that initial hands-on boost I needed. As of right now Ive solved more than 50 boxes (3 of them <p>HTB gave me that initial hands-on boost I needed. As of right now Ive solved more than 50 boxes (4 of them
“Insane”: DarkCorp, Mist, and MassGarden).</p> “Insane”: DarkCorp, Mist, MassGarden and Cobblestone).</p>
<p>I like to solve different challeneges there, especially reverse engineering, web and pwn.</p>
<p>Even though I sometimes rely on writeups and walkthroughs, I learn a lot from the infrastructure behind <p>Even though I sometimes rely on writeups and walkthroughs, I learn a lot from the infrastructure behind
each box.</p> each box.</p>
<hr /> <hr />
<h2>Some projects I have</h2>
<h3>Facinus</h3>
<a class="post-title" href="https://github.com/elleoma/facinus" target="_blank">Repo</a>
<p>Since our college switched from Windows to Ubuntu, I had a cool idea to remotely control my classroom PCs.
</p>
<p>I discovered <a href="https://gsocket.io/" target="_blank">gsocket.io</a> and started developing a tool that deploys a local web admin panel to
collect logs from connected clients.</p>
<p>I used an Ubuntu VM in QEMU and Bash scripted everything with some help of AI.</p>
<h3>OS-in-1000-lines</h3>
<p><a class="post-title" href="https://github.com/elleoma/os-in-1000-lines" target="_blank">Repo</a>
<p>My implementation of <a href="https://operating-system-in-1000-lines.vercel.app/en">Operating System in 1000 lines</a> by <a href="https://www.shuwasystem.co.jp/author/a269003.html">Shinya Yanagita.</a></p>
<p>A small operating system written from scratch for RISC-V CPU architecture.</p>
<p>This project will have basic context switching, paging, user mode, a command-line shell, a disk device driver, and file read/write operations in C.</p>
<p>And also I'll try to add some more functionality to it.</p>
<p>Right now I'm still working on basic stuff before implementing something new.</p>
<p>I'm still learning C and Assembly, the RISC-V instruction set is new to me.</p>
<h3>Reverse engineering book translation</h3>
<p><a class="post-title" href="https://github.com/elleoma/reversing-ukrainian/tree/ukrainian-translation" target="_blank">Repo</a>
<p><a class="post-title" href="https://elleoma.github.io/reversing/" target="_blank">Book translation</a>
<p>This is a book from <a href="https://twitter.com/mytechnotalent" target="_blank">@mytechnotalent</a> (English version <a href="https://0xinfection.github.io/reversing " target="_blank">here</a>) that I decided would be cool to translate in Ukrainian with automated python script and LLM hosted locally</p>
<p>I generally moved from outdated gitbook to honkit for publishing this as an E-book, created a python script for
parsing markdown files and translating using LTEngine and Llama LLM (8b params) hosted locally.</p>
<p>I was also able to make an automatic push to my github pages on each update</p>
<hr />
<h2>Bug bounty</h2> <h2>Bug bounty</h2>
<p>Bug bounty is fascinating — legally hacking in-scope apps and possibly earning money.</p> <p>Bug bounty is fascinating — legally hacking in-scope apps and possibly earning money.</p>
<p>But as a beginner, its tough. Recon is time-consuming, and rewards dont always justify the effort unless <p>But as a beginner, its tough. Recon is time-consuming, and rewards dont always justify the effort unless
you're really skilled.</p> you're really skilled.</p>
<p>Ive tried a few programs but haven't found any serious vulnerabilities yet. I plan to shift my focus <p>But there is a big amount of knowledge I'm gainining, when exploring all the different aprroaches these companies use to secure themselves.
toward learning specific attack techniques and improving my skills first.</p> It doesn't always bring financial benefits, but it always provides practical experience working with real targets.</p>
<p>I like to compare bug-bounty to a chess game: you have several 'openings' but with each step you open more available steps to play around.</p>
<hr /> <hr />
<p dir="auto"> <p dir="auto">
<a target="_blank" rel="noopener noreferrer nofollow" href="https://elleoma.github.io/self-host.png"> <a target="_blank" rel="noopener noreferrer nofollow" href="https://elleoma.github.io/self-host.png">
<img src="../self-host.png" alt="My self-hosting setup" style="width: 280px;" class="align-to-right"> <img src="self-host.png" alt="My self-hosting setup" style="width: 280px;" class="align-to-right">
</a> </a>
</p> </p>
<h2>Self-hosting</h2> <h2>Self-hosting</h2>