Skip to content
View Ruby570bocadito's full-sized avatar
🎯
Focusing
🎯
Focusing

Block or report Ruby570bocadito

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Ruby570bocadito/README.md

header

Typing SVG


CiberApuntes GitHub LinkedIn Location Open to Work

views    followers


About Me

Cybersecurity developer specializing in offensive security tooling — building the complete attack chain from reconnaissance to command & control. Focused on kernel-level rootkits, C2 frameworks, privilege escalation engines, and AI-assisted pentesting operations.

name: Ruby
location: Spain
focus: Offensive Security & Red Team Tooling
languages:
  - Go
  - Python
  - C
  - Bash
interests:
  - Kernel Rootkits
  - C2 Development
  - Privilege Escalation
  - AI/ML Security
  - Adversarial ML
education:
  - Cisco NetAcad: Ethical Hacker
  - Cisco Academy: Python, Networking, Linux
  - Cambridge: B1 English
status: Open to cybersecurity opportunities

🎯 Core Projects

Project Description Tech
rooteame Linux LKM kernel rootkit with syscall hooking, process/file/port hiding, kernel keylogger, and self-hiding capabilities C, Go
peekaboo Linux privilege escalation auto-exploiter with 10+ scanners, 60+ GTFOBins offline database, auto-root via SUID/sudo/cron/Docker Go
BTY Post-exploitation C2 framework with X25519 + XChaCha20-Poly1305 encryption, AV evasion, SOCKS5 proxy, 7 modules Go, Vue 3
Wormy ML-powered polymorphic network worm with dynamic encryption, multi-vector propagation, adversarial ML evasion Python
SPECTER Offline AI-powered offensive security assistant with Ollama integration and sandboxed execution Python
OSINT-EYE Automated OSINT reconnaissance tool with data collection, visualization, and reporting Python
📂 View All Repositories
Repository Category
rooteame Kernel Rootkit
peekaboo PrivEsc Auto-Exploiter
BTY C2 Framework
Wormy-ML-Network-Worm ML Network Worm
SPECTER-AI AI Pentest Terminal
OSINT-EYE OSINT Tool
pentesting-env Pentesting Setup
Training-CTF CTF Platform
C2-Server Minimalist C2
Bliblioteca-Pentesting Knowledge Library
Vibe-Hacking AI Pentesting
Ollama-Forge AI Interface
GestureOS Gesture Control

🛠️ Tech Stack

languages

pentesting tools

Hydra · John · Hashcat · SQLMap · Ghidra · GDB · Strace · Tcpdump · Aircrack-ng · Impacket · BloodHound · Cobalt Strike · Sliver · Mimikatz · CrackMapExec · Responder · Netcat · Socat · Radare2 · Frida · Burp Suite · Nmap · Wireshark · Metasploit


📊 Activity

activity graph


Open to internships & opportunities in cybersecurity · Málaga, Spain

GitHub LinkedIn CiberApuntes

footer

Pinned Loading

  1. Wormy-ML-Network-Worm Wormy-ML-Network-Worm Public

    ML-powered polymorphic network worm — self-replicating payload with dynamic encryption, multi-vector propagation, and adversarial evasion.

    Python 3 2

  2. SPECTER-AI-Powered-Offensive-Security-Terminal SPECTER-AI-Powered-Offensive-Security-Terminal Public

    AI-Powered Offensive Security Terminal — 100% offline pentesting assistant with Ollama, sandboxed execution, and real-time guidance.

    Python

  3. GestureOS-ComputerControl-ML GestureOS-ComputerControl-ML Public

    Gesture-based computer control powered by machine learning — move cursor, click, type, and control your PC with hand gestures.

    Python

  4. Vibe-Hacking-ML-Automation Vibe-Hacking-ML-Automation Public

    AI-assisted penetration testing automation — ML-powered vulnerability discovery and exploitation workflow.

    Python

  5. Alpaca-Trading-ML Alpaca-Trading-ML Public

    Python

  6. peekaboo peekaboo Public

    Linux Privilege Escalation Auto-Exploiter — single binary, zero deps, auto-root

    Go