INITIALIZING SYSTEM...
LOADING MODULES: [SEC] [NET] [UI]
»
PROFILE
LOGS
KIT
EXPLOITS
VULNS
CERTS
SYSTEM
COMM
REESHASX
RED TEAM OPERATIVE
PROFILE_DATA
SYSTEM_LOGS
ARSENAL_KIT
EXPLOITS
VULN_DB
CERT_STORE
SYSTEM_DASH
SECURE_COMM
IP: 127.0.0.1
STATUS: ONLINE
[ SYN ] → [ SYN/ACK ] → [ ACK ]
./
IDENTITY_OVERVIEW
● SYSTEM ACTIVE
// VISUAL_SIGNATURE
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⡔⠢⡀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⡐⠀⠀⡏⡠⢄⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⣀⠜⠀⠀⠛⢻⠀⢰⠀⠀⠀
⠀⠀⠀⠀⠀⠀⢘⢫⠖⠀⠀⠀⠸⠋⠀⠆⠀⠀⠀
⠀⠀⠀⠀⢀⡔⢸⣯⠀⠀⠀⠀⣄⣴⣿⡄⠀⠀⠀
⠀⠀⠀⠀⡼⠀⣤⢛⢦⠀⠆⠀⠿⠉⠀⡆⠀⠀⠀
⠀⠀⣀⠼⢥⣾⠎⠀⠘⣷⠏⠀⠀⠀⠀⠸⡀⠀⠀
⠈⠙⠻⣶⠾⡷⠇⠀⠀⠘⠀⠀⠀⠄⠀⠀⣱⡀⠀
⠀⠀⡰⣻⡑⠀⠟⡇⠄⢀⠀⠐⣄⢸⡀⣾⣿⡇⠀
⠀⠀⢰⣿⣷⠆⠀⠘⢮⢮⣦⣀⠟⠃⠙⢿⡙⢆⠀
⠀⠀⠈⣏⣏⠀⠀⠀⠀⠀⠉⠙⠆⠀⠀⠀⠋⢷⡄
⠀⠀⠀⠀⠉⠁⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠉⠀
CODENAME
REESHASX
@reeshasx
~/identity/about.sh
$
cat
/etc/mission
TARGET: @reeshasx
ROLE: Python Programmer /Red Team / IT Specialist
LOCATION: BA - Brazil
STATUS: Bachelor's in Computer Science (In Progress)
MISSION:
Seeking to apply IT skills in a dynamic environment, contribute to impactful projects, and grow continuously through hands-on experience in offensive security and infrastructure.
// FOCUS_AREAS
Red Team Ops
Bug Bounty
(bad :p) Malware Analysis
CTF Player
Python Dev
Cloud Infra
[YOU]
----->
[PORTFOLIO]
----->
[REESHASX]
----->
[COLLABORATION?]
./
EXECUTION_HISTORY
[LOGS: 1]
// ROLE_DEFINITION
Administrative Assistant
@ Sesi Fieb
[2024-2025]
// TASKS_EXECUTED
>
Responsible for managing documents and organizing internal processes.
>
Supporting the IT department with inventory and technical assistance.
>
Developed automations using spreadsheets and Python scripts.
>
Handled supplier communication and solved daily operational issues.
./
CAPABILITIES_MATRIX
[MODULES: 5]
./
ACTIVE_OPERATIONS
6 PAYLOADS LOADED
$
Automation using OCR and OMR
./exploits/automation_using_ocr_and_omr.py
Developed an automation solution leveraging OCR and OMR to extract data from physical documents, populate forms, and integrate comments.
Python
OCR
OMR
Computer Vision
EXECUTE_PAYLOAD
→
$
C2 TUI Trojan
./exploits/c2_tui_trojan.py
Creating a C2 TUI Trojan with python, socket and textual; it can be used to control a remote machine and grab information from it.
Python
Socket
Textual
EXECUTE_PAYLOAD
→
RESEARCH
|
2025
COMPLETED
$
Pure Linux HTTP Server
./exploits/pure_linux_http_server.py
Creating a HTTP server with echo and systemD socket without external tools or dependencies.
Bash
SystemD
Linux
EXECUTE_PAYLOAD
→
RESEARCH
|
2025
COMPLETED
$
How to use /dev/tcp/
./exploits/how_to_use_/dev/tcp/.py
Using linux /dev/tcp to create a http request with descriptor with just pure linux without external tools or dependencies.
Bash
Linux
Networking
EXECUTE_PAYLOAD
→
$
Massive Port Scanner + Grafana
./exploits/massive_port_scanner_+_grafana.py
I made a grafana panel with grafana(promtail and loki), python and docker to scan a IP CIDR to look for vulnerabilities and other technologies.
Python
Docker
Grafana
Loki
Promtail
EXECUTE_PAYLOAD
→
$
Honeypot Dashboard
./exploits/honeypot_dashboard.py
I made a honeypot with grafana dashboard heatmap to look for attacks from massscan and other tools.
Python
Grafana
Docker
EXECUTE_PAYLOAD
→
OFFENSIVE: 2
DEFENSIVE: 1
RESEARCH: 3
ALL_SYSTEMS_NOMINAL
./
VULNERABILITY_DATABASE
● 4 RECORDS_FOUND
SAPPHOS
TWITTER
>>
IDOR that allowed accessing all users data and ID-holding photos
NETFLIX
HACKERONE
>>
Lodash version disclosure via exposed banner
COINBASE
HACKERONE
>>
WAF bypass & OpenResty version exposure
HOSTINGER
HACKERONE
>>
Local File Inclusion (LFI) in web app
./
AUTHORIZATION_KEYS
[VERIFIED: 3]
// SECURE_STORAGE_ENCRYPTED
TOTAL: 3
SYNCED
./
SYSTEM_TELEMETRY
STATUS:
● ONLINE
>
COMMS_UPLINK
ENCRYPTION: ENABLED
● SIGNAL_STABLE
_
|E]
.-|=====-.
| | MAIL |
|________|___
||
||
|| www %%%
vwv || )_(,;;;, ,;,\_/ www
)_( || \|/ \_/ )_(\| (_)
\| \ || /\\|/ |/ \| \|// |
___\|//__/||//_\V/_\|//_______\\|//V/\\|/__
TRANSMISSION_COMPLETE
Hash: 7f8a9d...c2b1
Status: DELIVERED_TO_ARCHIVE
[ SEND_ANOTHER_PACKET ]
> MONITORING_FREQUENCIES...
´´´´´´´´´´´´´´´´´´´´´´¶¶¶¶¶¶¶¶¶
´´´´´´´´´´´´´´´´´´´´¶¶´´´´´´´´´´¶¶
´´´´´´¶¶¶¶¶´´´´´´´¶¶´´´´´´´´´´´´´´¶¶
´´´´´¶´´´´´¶´´´´¶¶´´´´´¶¶´´´´¶¶´´´´´¶¶
´´´´´¶´´´´´¶´´´¶¶´´´´´´¶¶´´´´¶¶´´´´´´´¶¶
´´´´´¶´´´´¶´´¶¶´´´´´´´´¶¶´´´´¶¶´´´´´´´´¶¶
´´´´´´¶´´´¶´´´¶´´´´´´´´´´´´´´´´´´´´´´´´´¶¶
´´´´¶¶¶¶¶¶¶¶¶¶¶¶´´´´´´´´´´´´´´´´´´´´´´´´¶¶
´´´¶´´´´´´´´´´´´¶´¶¶´´´´´´´´´´´´´¶¶´´´´´¶¶
´´¶¶´´´´´´´´´´´´¶´´¶¶´´´´´´´´´´´´¶¶´´´´´¶¶
´¶¶´´´¶¶¶¶¶¶¶¶¶¶¶´´´´¶¶´´´´´´´´¶¶´´´´´´´¶¶
´¶´´´´´´´´´´´´´´´¶´´´´´¶¶¶¶¶¶¶´´´´´´´´´¶¶
´¶¶´´´´´´´´´´´´´´¶´´´´´´´´´´´´´´´´´´´´¶¶
´´¶´´´¶¶¶¶¶¶¶¶¶¶¶¶´´´´´´´´´´´´´´´´´´´¶¶
´´¶¶´´´´´´´´´´´¶´´¶¶´´´´´´´´´´´´´´´´¶¶
´´´¶¶¶¶¶¶¶¶¶¶¶¶´´´´´¶¶´´´´´´´´´´´´¶¶
´´´´´´´´´´´´´´´´´´´´´´´¶¶¶¶¶¶¶¶¶¶¶
LATENCY
12ms
PACKET_LOSS
0.0%
anon@garlic:~/deadrop# ./i2p_tunnel --outproxy
[*]
Building exploratory tunnels... 5 hops
[*]
Garlic routing active → encrypted
leaseset
|-> Hop1: RU → Hop2: DE → Hop3: FI → Out: NL
|-> Latency: 550ms | Jitter: 12ms
[*]
Outproxy selected: exit.stormycloud.i2p →
LIVE
[*]
Stream isolation: ENABLED
[*]
Encryption: ECIES-X25519 ON
[*]
No clearnet leaks detected
[+] I2P UPLINK ESTABLISHED. ZERO LOGS.
> AWAITING PACKET__
SYSTEM ARCHITECTURE BY RYSHA © 2025 // UNAUTHORIZED ACCESS PROHIBITED