Skip to content
View ruzgarcyber's full-sized avatar
:electron:
:electron:

Block or report ruzgarcyber

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
ruzgarcyber/README.md

🔴⚔️ Rüzgar Umut Gündoğan (ruzgarcyber)

Red Team Learner · Reverse Engineering (Learning) · Offensive Tool & Framework Developer (In Progress)

"Offense is engineering."


🩸 What I Focus On

  • 🔴 Red Team Fundamentals → Internal Network Attack Logic
  • 🧬 Reverse Engineering (Ghidra · Assembly · Binary Internals)
  • ⚙️ Offensive Tool & Framework Development (Python → Go Learning)
  • 🛰 Network Protocol Analysis (TCP/IP, ARP, DNS, SMB, HTTP internals)
  • 🛡 Adversary Simulation Mindset (manual recon, stealth, OPSEC logic)

🧬 Core Skills

  • Python Offensive Engineering

Building recon modules, scanners, enumeration logic, operational automation.

  • Reverse Engineering (Learning / Applying)

Ghidra(Learning) workflows, assembly reading, control‑flow tracing, binary behavior mapping.

  • Red Team Fundamentals → Operator-Level Progression

Attack-chain logic, privilege escalation theory, lateral movement concepts, manual enumeration mindset.

  • Network & Protocol Analysis

Packet inspection, traffic behavior profiling, TCP/UDP internals, Wireshark(Learning) low‑level workflows.

  • OSINT & Pre-Attack Intelligence

Infrastructure mapping, footprinting, adversary-prep data gathering.

Currently in the “apply & build” phase: implementing what I learn into real modules, tools and frameworks.


🔴 Tech Stack

Python · Go (Learning) · Linux · Git · Networking · VMware · VS Code · Wireshark (Learning) · Ghidra (Learning)


🛠 Tools & Environment

Kali TryHackMe HackTheBox VS Code Git VMware


📂 Selected Projects


📊 GitHub Statistics

Ruzgar's GitHub stats
Top languages

Note: Dynamic cards are automatically updated for user ruzgarcyber.


🔴 Current Goals

  • Achieve deep binary analysis proficiency & confident Ghidra navigation
  • Advance Go skills for high‑performance offensive tooling and concurrency‑based modules
  • Internalize lateral movement mechanisms (credential flow, token abuse, session pivot logic)
  • Architect a modular offensive framework with plug‑based operators and protocol‑specific modules
  • Strengthen network-level understanding (SMB dialects, RPC endpoints, DNS behavior, ARP poisoning logic)
  • Reinforce OPSEC discipline and decision‑flow for silent operations

📬 Contact

GitHub Email Twitter Reddit


💀 Hack to learn, not to harm.
“Learn the internals. Break the externals. Build your own tools. Repeat.”


Pinned Loading

  1. WindOSINT WindOSINT Public

    A simple and modular Python toolkit for OSINT tasks.

    Python 1

  2. AegisRecon AegisRecon Public

    AegisRecon — Lightweight Python vulnerability scanner with rich visuals and multi-threaded port scanning.

    Python 1

  3. DNSGuard DNSGuard Public

    A simple yet powerful DNS security checker that analyzes A, MX, NS, and TXT records for potential misconfigurations or missing security setups.

    Python 1

  4. LeakWatch LeakWatch Public

    LeakWatch – Offline Email Breach Checker in Python 🛡️

    Python 1