Skip to content
View Pushpenderrathore's full-sized avatar
:shipit:
I love solitude and enjoy writing code at an elite level.
:shipit:
I love solitude and enjoy writing code at an elite level.

Block or report Pushpenderrathore

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Pushpenderrathore/README.md

πŸ‘Ύ HackTheMatrix πŸ‘Ύ

Greetings and Welcome to my profile

I'm Pushpender Singh Rathore β€” an aspiring CyberSecurity Professional with a deep focus on ethical hacking and offensive security research.

πŸŽ“ I'm currently pursuing my B.Tech in Computer Science & Engineering, I have a strong foundation in computer systems, low-level programming, and exploit development.
πŸ’» I specialize in cybersecurity, reverse engineering, adversary simulation, vulnerability assessment and exploit development.
πŸ› οΈ My expertise includes C, C++, Python, Assembly, and low-level system manipulation, also familiar with tools and frameworks like Burpe Suite, Metasploit, Nmap, WireShark, Gdb, BinaryNinja and Ghidra.
βš”οΈ I actively engaged and participate on platforms like HackTheBox, TryHackMe, Overthewire and WeChall, where I continuously refine my practical and also sharpen my offensive skills.
πŸ“ I build and maintain tools for red teaming, penetration testing, malware analysis and custom offensive tools.

πŸ”’ I aim to contribute meaningfully to the security community by building secure systems, responsibly disclosing vulnerabilities, and staying at the forefront of cyber defense innovation.

visitors


GitHub Contributions

GitHub Badge

Contributed to:

  • Mirai-Source-Code
  • Enhanced README.md with research usage and ethical guidelines for malware analysis.

Hackthebox Profile

Hackthebox

Wechall Profile

WeChall


🌐 Socials:

Discord Twitter

πŸ’» Tech Stack:

PowerShell Python Shell Script Windows Terminal Apache Nginx C C++ Linux BlackArch Assembly Reverse Engineering ChatGPT Ollama Cybersecurity Hack The Box TryHackMe OverTheWire WeChall Bash Zsh Vim VSCode Nmap Shodan Kali Linux Parrot OS Windows VirtualBox VMware

πŸ“Š GitHub Stats:

GitHub Stats
GitHub Streak
Top Languages

πŸ† GitHub Trophies

✍️ Random Dev Quote

πŸ” Top Contributed Repo

πŸ“« How to Reach me:

Pushpenderrathore Pushpenderrathore Gmail


Star History

Star History Chart

Profile Views counting of visitors to this page in this section started from July 7, 2025


Pinned Loading

  1. shikigami-daemon shikigami-daemon Public

    AI which works online and offline on servers and handle systems to prevent from cyberattacks can be optimised according to usage

    Python 1

  2. brcm_automation_login brcm_automation_login Public

    For our college and hostel campus wifi router login.

    Shell 1

  3. LUKS2-nuke LUKS2-nuke Public

    Auto-Wipe LUKS2-Protected Linux System After 5 Failed Decryption Attempts

    Shell 1

  4. macchanger-daemon macchanger-daemon Public

    A systemd-based service that automatically randomizes the MAC addresses every 5 minutes of all network interfaces at boot using macchanger. Designed for Linux based Arch , debian , fedora systems w…

    Shell 1

  5. tor-browser tor-browser Public

    Tor-browser automation for downloading installing and processing no manual check. For biggeners

    Shell 1

  6. WUKS2 WUKS2 Public

    WUKS2 For windows Inherited from LUKS2 (Linux Unified Key Setup) In Development Phase Comming soon...

    C