Skip to content
View 0x95404's full-sized avatar
🌴
On vacation
🌴
On vacation

Block or report 0x95404

Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
0x95404/README.md

Hi There ✌️ I'm 0x95404

Typing SVG

☠️ Kernel Alchemist's Manifesto

+ 𝕮𝖗𝖆𝖋𝖙𝖎𝖓𝖌 𝖍𝖞𝖕𝖊𝖗𝖛𝖎𝖘𝖔𝖗𝖘 𝖎𝖓 𝕮₁₀𝕳₁₅𝕹 ⚗️ & ⟨0x95⟩ 🔣  ! 𝕭𝖆𝖗𝖊-𝖒𝖊𝖙𝖆𝖑 𝖘𝖊𝖌𝖋𝖆𝖚𝖑𝖙𝖘 𝖔𝖓𝖑𝖞 ⚡🖲️  # 𝕭𝖗𝖊𝖜𝖎𝖓𝖌 𝖍𝖊𝖎𝖘𝖊𝖍_𝕺𝕾 🌀 @0x95 (149.23 𝕸𝖔𝖑𝖆𝖗 𝕸𝖆𝖘𝖘)  - 𝕰𝖗𝖗𝖔𝖗 404: 𝖁𝖆𝖓𝖎𝖘𝖍𝖎𝖓𝖌 𝖆𝖈𝖙𝖘 𝖎𝖓 𝖐𝖊𝖗𝖓𝖊𝖑 𝖘𝖕𝖆𝖈𝖊  📈 Kernel Panic Stats 🛠️ Tech Grimoire ⚙️ Core Alchemy - **0xDEADCODE** - Rewriting `/dev/null` in hex  - **Kernel Panic Fuel** - C++ template metaprogramming that segfaults on sight  - **Syscall Roulette** - Russian轮盘赌 with `fork()`  - **Void Pointers Anonymous** - Support group for dereferencing addicts  ☢️ Virtualization Arsenal - **Hypervisor of Chaos** - QEMU patch that randomizes CPUID  - **KVM Blue Sky** - Injecting meth formulas into VM entropy pools  - **Docker of Despair** - Images that `rm -rf /*` on `docker stop`  - **K8s Reaper** - CronJob that deletes namespaces at midnight  💀 Memory Corruption Kit - **GDB Black Magic** - Breakpoints that trigger triple faults  - **Radare2 Hexorcist** - Disassembling binaries into I Ching hexagrams  - **LLDB Ouija Board** - Communicating with dead processes  - **Stack Smashing for Dummies** - Buffer overflow coloring book  ## 🔮 Dark Contributions <details> <summary><b>🕳️ Void Whisperer Projects</b></summary> - **Phantom Kernel**  `C++` `LLVM` `QEMU` _Bare-metal hypervisor that leaves no trace in memory_ - **0xDEADCODE Compiler**  `Rust` `WASM` `Lua` _Transpiles code into "vanishing bytecode" that self-destructs after execution_ - **Cryptic.Torrent**  `Python` `libp2p` `AES-NI` _Distributed knowledge repository that evaporates after 404 seconds_ 👻 Memory Phantoms - **GDB Necromancer**  `GDB Python API` `ptrace` `DWARF` _Revives core dumps into zombie processes_ - **Radare2 Sigils**  `Radare2` `Capstone` `Unicorn` _Reverse engineers binaries into occult assembly patterns_ - **Stack Ouija**  `C` `ASAN` `KASAN` _Communicates with dead stack frames through buffer overflows_ 🌀 Hypervisor Hexes ![KVM](https://img.shields.io/badge/-𝕶𝖁𝕸-000000?style=flat&logo=virtualbox) ![Xen](https://img.shields.io/badge/-𝕏𝕰𝕹-000000?style=flat&logo=xen) ![QEMU](https://img.shields.io/badge/-𝕼𝕰𝕸𝖀-000000?style=flat&logo=qemu) - **KVM Curse** - _Inject blue screens into guest VMs_  - **Xen Shadow** - _Hide processes in negative dimension_  - **QEMU Soulbind** - _Tether VMs to dying host processes_ 🧪 Cryptic Languages ```hex Offset 0 1 2 3 4 5 6 7 8 9 A B C D E F 00000000 7f 45 4c 46 02 01 01 00 00 00 00 00 00 00 00 00 00000010 02 00 3e 00 01 00 00 00 78 00 40 00 00 00 00 00 ELF header incantation written in raw hex Language	Purpose	Danger Level BaneC	Memory corruption liturgy	☠️☠️☠️☠️ Rustigo	Unsafe possession rituals	☠️☠️☠️ Pythonomicon	Scripted reality bending	☠️☠️ 🕸️ Shadow Protocols / 🌑 Network Necromancy - **Packet Séance**  `WireShark` `tcpdump` `libpcap` _Summoning deceased TCP sessions from network purgatory_ - **DNS Blood Magic**  `Bind9` `dnsmasq` `PowerDNS` _Resolving .onion domains through sacrificial DNS queries_ - **HTTP 666 Gateway**  `Nginx` `Lua` `OpenResty` _Serving forbidden content with self-destructing cookies_ ![Protocol Hell](https://img.shields.io/badge/-𝕾𝖍𝖆𝖉𝖔𝖜_𝕺𝖘𝖎-000000?style=flat&logo=internet-explorer) 🔐 Cryptic Ciphers / 🦠 Cryptographic Plagues ```python # ROT-666 cipher implementation def rot666(text): return bytes([(c + 666) % 256 for c in text.encode()]) print(rot666("Segmentation fault (core dumped)")) Cipher	Tools	Effect Soulbound	OpenSSL, NaCl	Keys that die with owner Thanatos	AES-NI, TPM 2.0	Self-decrypting ephemeral Necrohash	SHA-3, RIPEMD-160	Revives hashes from graves 👁️ Virtual Machine Oracles / 🌀 Spectre Hypervisors KVM Geist Virtual machines that run on dead CPU cores qemu-system-x86_64 -enable-kvm -cpu necro,+sep VirtualBox Phantasm VM snapshots that haunt host memory VBoxManage internalcommands creategost --name Specter VMware Revenant Zombie VMs that resurrect after deletion vmware-x --net.pact-with-devil=true 🩸 Ominous Toolchain / ⚰️ Assembly Necrodancy ; x86_64 Death Incantation section .text global _start _start: mov rax, 60 ; sys_exit mov rdi, 0xDEAD ; exit code syscall Tool	Purpose	Danger Level GDB Voodoo	Debugging parallel realities	☠️☠️☠️☠️ Hex Fiend	Binary soul manipulation	☠️☠️☠️ Radare2 Ouija	Communicating with dead code	☠️☠️☠️☠️ 💾 Cursed Filesystems Ext4 Damnation debugfs e2fsprogs Filesystem where deleted files haunt inodes ZFS Abyss zpool OpenZFS Storage pools that consume adjacent disks Btrfs Limbo btrfs-progs Snapshots trapped between COW realities Filesystem Shell Want me to conjure more dark tech elements? I can add: - 🧟 CI/CD Necromancy pipelines  - 🔥 Database infernos  - 🌑 AI summoning circles <!--- 0x95404/0x95404 is a ✨ special ✨ repository because its `README.md` (this file) appears on your GitHub profile. You can click the Preview link to take a look at your changes. --->

Pinned Loading

  1. Xen-Project-Mastery Xen-Project-Mastery Public

    Master the most powerful open-source Type-1 hypervisor with our comprehensive step-by-step learning platform, optimized for your HP

  2. community/community community/community Public

    Public feedback discussions for: GitHub Mobile, GitHub Discussions, GitHub Codespaces, GitHub Sponsors, GitHub Issues and more!

    Ruby 8.1k 3.5k

  3. Err-Secret Err-Secret Public

    Forked from Error257/Err-Secret

    A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.

    1