Skip to content
View LuCyanXsecurity's full-sized avatar

Block or report LuCyanXsecurity

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
LuCyanXsecurity/README.md

Hi there

I'm LuCyan, a hacker & Security Researcher and aspiring Cybersecurity Specialist and Bug Hunter. With a strong passion for technology and expertise in malware analysis, vulnerability assessment and bug hunting, my goal is to safeguard digital assets and contribute to a more secure online community.

More about me
  • Name: LuCyan
  • From: Internet 🌐
  • Bug Hunter | Security Researcher | forensics Analyst
  • i have experience in Cracking,Reverse Engineering,Malware Analysis,Social engineering,Detective
  • Improving knowledge in Webapp Vulnerabilities
  • Lifelong learner β€” always exploring everything
  • Reach me out at LuCyanXsecurity@gmail.com


Present Status

πŸ‘‰ Still Learning Bug hunting & malware forensics.

πŸ‘‰ Managing Tech Communities & Content creator.

πŸ‘‰ Writing Some Useful Tools For Myself & Communities

πŸ‘‰ Building & Contributing To Open Source Projects

πŸ‘‰ Currently Learning mobile pentesting & web3

Updating: Journey to Cybersecurity Specialist.


Knowledge & Skills


Burp Suite Metasploit Wireshark Bash Python Linux Go Git Debian Docker Flutter C C++ Java HTML5 CSS3 JavaScript BlackArch MongoDB ExpressJS React Parrot OS NodeJS Ubuntu Kali Linux VS Code

GitHub Stats πŸ‘¨πŸ’»

LuCyan's GitHub stats GitHub Streak



"Never give up. Never back down."

🌱

snake animation

Popular repositories Loading

  1. Bug-Bounty-Toolkit Bug-Bounty-Toolkit Public

    🐞 A curated collection of tools and resources for Bug Bounty hunting. Includes subdomain enumeration, vulnerability scanning, automation scripts, and more.

    TypeScript 2

  2. Mr-Robot-1 Mr-Robot-1 Public

    Write-up fot Mr.Robot CYF from VulnHub, Focused on enumeration and exploitation

    2

  3. Basic-Pentesting-1 Basic-Pentesting-1 Public

    Write-up for the β€œBasic Pentesting 1” CTF from VulnHub. Includes steps of enumeration, exploitation, and privilege escalation.

    2

  4. Basic-Pentesting-2 Basic-Pentesting-2 Public

    Walkthrough of VulnHub's Basic Pentesting 2 β€” includes enumeration, SSH brute force, and privilege escalation.

    2

  5. LazySysAdmin-1 LazySysAdmin-1 Public

    Walkthrough of VulnHub's LazySysAdmin machine β€” covers web enumeration, password reuse, and Linux privilege escalation.

    2

  6. IA-Tornado IA-Tornado Public

    IA: Tornado is an intermediate Linux CTF on VulnHub. Challenges include web enumeration techniques, SQL Truncation exploits, encrypted file decoding, remote code execution, and privilege escalation…

    1