Skip to content
View Vasco0x4's full-sized avatar
🕸️
🕸️

Block or report Vasco0x4

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Vasco0x4/README.md

Hello, I'm Vasco0x4!

Neo in action

Cybersecurity | C++ & Python Developer

I specialize in reverse engineering, memory hacking, C2 server analysis, and malware development.

🔧 Ongoing Projects:

  • C2 Server Detection API: Scanning URLs and ports to detect Command & Control servers by analyzing response patterns.
  • Windows API Monitoring for Suspicious Activity: Developing an EDR alternative that monitors Windows API calls for signs of malicious behavior.

🔥 AI & LLM Projects:

Project Description Language
Neo-AI Neo AI integrates into the Linux terminal Python

🛡️ Malware Development:

Project Description Language
ShadeLoader A custom loader for executing shellcode with evading techniques. C++
Simple Process Hollowing Demonstration of process hollowing for shellcode execution. C++

📊 Stats:

Top Langs

Pinned Loading

  1. Neo-AI Neo-AI Public

    Neo AI integrates into the Linux terminal, capable of executing system commands and providing helpful information.

    Python 89 4

  2. ShadeLoader ShadeLoader Public

    ShadeLoader is a shellcode loader designed to bypass most antivirus software. 壳代码, 杀毒软件, 绕过

    C++ 36 4