Skip to content
View s0ld13rr's full-sized avatar
🏠
Working from home
🏠
Working from home

Block or report s0ld13rr

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
s0ld13rr/README.md

Zhangir Ospanov

Offensive Security Researcher

Specializing in Red Team operations, Threat Hunting, and Threat Intelligence

Telegram · Blog · GitHub

Practical insights from real-world attacks and security research.


About Me

I am an independent offensive security researcher with experience in Red Team operations, threat analysis, and malware investigation. My focus is on practical exploitation techniques, understanding attacker behavior, and sharing actionable insights with the security community.


Areas of Expertise

  • Red Team operations & adversary simulation
  • Threat Hunting & Threat Intelligence
  • Vulnerability research & malware analysis

Publications & Content

I regularly share technical write-ups, research notes, and case studies on:

  • Threat Hunting & Threat Intelligence
  • Malware & C2 traffic analysis
  • Red Team techniques and operational insights

📢 Telegram: s0ld13r_ch 📝 Blog: s0ld13r.kz


GitHub Statistics


"If it can be abused, it will be."

Pinned Loading

  1. claude-code-backdoor claude-code-backdoor Public

    Backdooring Claude Code via hooks in settings.json. Authorized use only!

    JavaScript 57 10

  2. tarahunter tarahunter Public

    High-speed, multi-threaded APT hunting tool designed for lateral movement detection and forensic artifact discovery in Windows environments via SMB.

    Go 13 1

  3. jdwp-knife jdwp-knife Public

    Swiss knife for JDWP exploitation

    Python 12 1

  4. gophish-auto gophish-auto Public

    GoPhish autodeployment

    Shell 7 3

  5. firec2 firec2 Public

    C2 over Firebase Realtime Database

    Python 7

  6. GhostShell GhostShell Public

    Covert C2 tool using Telegram Bot API as communication channel, command delivery is implemented by transfering emojis

    Python 4