Skip to content
View sophireaksoeng's full-sized avatar

Block or report sophireaksoeng

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
sophireaksoeng/README.md

matrix scan banner

root@sophireak


user@sophireak:~/research_focus$ cat current_objectives.txt
> Primary: eBPF-Based Kernel Stealth & Visibility Manipulation
> Secondary: CompTIA Security+ & Advanced CTF Exploitation
> Values: clarity · reproducibility · scoped experimentation



~/capabilities

  • Reconnaissance: Attack surface assessment and service enumeration.
  • Controlled Exploitation: Technique validation within strict, well-defined scopes.
  • Post-Exploitation: Artifact collection and detection engineering analysis.
  • Reporting: Structured Markdown/LaTeX documentation with remediation guidance.

./toolbox.sh

LOW-LEVEL & KERNEL OFFENSIVE OPS (CTF/LAB) TELEMETRY & ANALYSIS
Linux C Python
eBPF Bash
Syscalls · Kprobes · Memory
Metasploit Burp Suite
Nmap Bloodhound
PrivEsc · Web · Active Directory
Wireshark ELK
YARA Tcpdump
Detection Eng · Forensics

Infrastructure & Reproducibility:
Docker K8s Git


/etc/policy.conf & contact

Engagement Policy:
- Tests performed only with explicit permission.
- Focus on education and defense.
- Define scope and success criteria up front.
Connection:
sophireaksoeng@gmail.com
Collabs via Issues/Discussions

/* --- kernel panic: end of file --- */

@sophireaksoeng's activity is private