Skip to content
View fsoc-ghost-0x's full-sized avatar
πŸ•΅οΈ
Fsociety
πŸ•΅οΈ
Fsociety
  • Fsociety - Red Team
  • [Encrypted]

Block or report fsoc-ghost-0x

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
fsoc-ghost-0x/README.md

Fsociety Banner

β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•— β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—  β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ•—β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ•—   β–ˆβ–ˆβ•—
β–ˆβ–ˆβ•”β•β•β•β•β•β–ˆβ–ˆβ•”β•β•β•β•β•β–ˆβ–ˆβ•”β•β•β•β–ˆβ–ˆβ•—β–ˆβ–ˆβ•”β•β•β•β•β•β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β•β•β•β•β•β•šβ•β•β–ˆβ–ˆβ•”β•β•β•β•šβ–ˆβ–ˆβ•— β–ˆβ–ˆβ•”β•
β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—  β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ•‘   β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘     β–ˆβ–ˆβ•‘β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—     β–ˆβ–ˆβ•‘    β•šβ–ˆβ–ˆβ–ˆβ–ˆβ•”β• 
β–ˆβ–ˆβ•”β•β•β•  β•šβ•β•β•β•β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘   β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘     β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β•β•β•     β–ˆβ–ˆβ•‘     β•šβ–ˆβ–ˆβ•”β•  
β–ˆβ–ˆβ•‘     β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•‘β•šβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•”β•β•šβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ•‘β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—   β–ˆβ–ˆβ•‘      β–ˆβ–ˆβ•‘   
β•šβ•β•     β•šβ•β•β•β•β•β•β• β•šβ•β•β•β•β•β•  β•šβ•β•β•β•β•β•β•šβ•β•β•šβ•β•β•β•β•β•β•   β•šβ•β•      β•šβ•β•   

C0deGhost.sh --internal

Lead Offensive Developer | Red Team Operator | Digital Forensic Architect


Identity: C0deGhost | Status: ACTIVE_OPERATIVE | Authorization: LEVEL_5_CLEARANCE

HTB Platinum HTB Global Profile
Telemetry verification: Platinum Operator Status Confirmed

Role Specialization Environment Platform


β–Œ 0x00_TABLE_CONTENT

Decrypting Full Intelligence Dossier...

β–Œ 0x01_INTERNAL_MONOLOGUE

Accessing Manifesto... Hello, friend.

Most people look for a door. I look for the gaps between the bricks. Ethical hacker by day, shadow architect by night. I am an offensive security researcher passionate about the physics of failureβ€”breaking complex systems to understand how to rebuild them stronger.

I operate in the intersection between raw binary and psychological subversion. Specialist in dismantling infrastructures, weaponizing logic flaws, and maintaining absolute invisibility. Whether I'm deploying a kernel exploit from a high-end workstation or pivoting through a network from a non-rooted mobile terminal, the objective remains the same: Total Domain Dominance.


"Breaking systems is a science; fixing them is an art."


β–Œ 0x02_OPERATOR_DATA_DOSSIER

Decrypting Full Intelligence Dossier...

β–Œ Operational Environments & Stealth

  • Offensive & Forensic Platforms:

    • Kali Linux & Parrot OS: Primary hardened environments for full-scale Red Team engagements.
    • Arch Linux: Custom-built, minimal footprint OS for specialized exploitation R&D.
  • Stealth & Anonymity (Anti-Forensics):

    • Tails & Whonix: Advanced traffic routing (Tor/I2P) and zero-trace operational security.
    • Live Mode Operation: Expert execution in volatile memory (RAM-only) to bypass disk-based forensic analysis.
  • Mobile Warfare & Remote Ops:

    • Termux Hacking: High-proficiency in ARM-based exploitation and pivoting from non-rooted environments.
    • Kali NetHunter: Mobile-first physical intrusion, wireless attacks, and HID/BadUSB delivery.
    • Field Strategy: "Living off the Land" in degraded environmentsβ€”executing kill-chains without persistent storage.

β–Œ Offensive Development & Analysis

  • Malware Engineering (0x01.1):

    • Development of custom malware, shellcoding, and advanced polymorphic payloads.
    • Advanced AV/EDR/Firewall bypass and custom persistence mechanisms.
  • Defensive Analysis & Forensics (0x04):

    • Incident Response, evidence recovery, and static/dynamic malware dissection.
    • Vulnerability discovery through secure code auditing and mitigation PoC creation.

β–Œ Hardware & Niche Domains (0x05)

  • Hardware Hacking:
    • Physical device exploitation, firmware dumping, and wireless network infiltration.
  • FinTech Security:
    • Crypto-asset hacking and blockchain-level vulnerability research.
  • Mobile Security:
    • Advanced Termux pentesting and mobile application (Android/iOS) security auditing.

β–Œ 0x03_TECHNICAL_CAPABILITIES_MATRIX

Sector Specialization Clearance Level
Exploitation Malware Engineering & Custom Shellcoding BLACK_HAT_LEVEL
Infrastructure Active Directory Dominance & ADCS Abuse DOMAIN_ADMIN
Cloud/Web API Security & Insecure Deserialization ADVANCED
Low-Level Kernel-land Research & Buffer Overflows SYSTEM_ROOT
Forensics Evidence Recovery & Malware Dissection INVESTIGATOR

β–Œ 0x04_OFFENSIVE_ARSENAL_STACK

Languages of Subversion:
Python Bash C++ Assembly


Tactical Hardware & Tooling:
Metasploit BurpSuite CobaltStrike Docker



Visual Attack Flow (Operational Mindset)

graph LR;
    A["Infection Vector"] --> B{"Initial Access"};
    B --> C["Credential Harvest"];
    C --> D["Lateral Movement"];
    D --> E{"LPE / Kernel Exploit"};
    E --> F["Total Dominance"];

    style F fill:#111,stroke:#ff4500,stroke-width:2px,color:#ff4500
    style B fill:#222,stroke:#888,color:#888
Loading

β–Œ 0x05_OPERATIONAL_FOOTPRINT

Direct Access to Encrypted Data Streams:



[ SECTOR: RANK_VERIFICATION ]
HTB Rank



[ SECTOR: OPERATIONAL_METRICS ]
HTB Stats


Primary contact through encrypted metadata in repository logs.

β–Œ 0x05.1_THE_NEXUS: CUSTOM_AI_ORCHESTRATION

Accessing AI Framework Status...

[!] Status: OPERATIONAL | Role: Lead AI Architect & Operator


[+] FENRIR | Web Exploitation Engine

  • Specialization: Advanced Web App Auditing (CVE, Zero-Days, Tech Stack Analysis).
  • Capabilities: Custom Exploits, Payloads, Web-shells, and Advanced Backdoors.

[+] MR. BAKER | Forensic & Reverse Engineering Specialist

  • Specialization: Low-Level, Kernel Analysis, and Anti-Forensics.
  • Scope: Cross-platform (Android, iOS, Windows, Linux) and Mobile Sandbox Evasion.

[+] TERMINUS | Linux Exploitation & LPE

  • Specialization: Deep Linux Environment compromise and Post-Exploitation.
  • Capabilities: Automated LPE Research and Custom Kernel-Space Exploits.

[+] SPECTRE | Windows & Active Directory Dominance

  • Specialization: AD Infrastructure, DC takeover, and Windows Internals.
  • Capabilities: EDR/AV evasion payloads and Domain persistence mechanisms.

[+] VERITAS | Offensive Reporting & Intelligence Architect

  • Specialization: Transforming raw operational logs into high-impact strategic intelligence.
  • Impact: Automated synthesis of complex exploit chains into professional Technical/Executive reports.

[+] KAGE | Advanced Buffer Overflow & Binary Exploitation

  • Specialization: Memory corruption, Reverse Engineering, and Shellcode Engineering.
  • Scope: x64/x86 architectures, binary analysis, and server-side exploitation.

[!] UNDER DEVELOPMENT: [REDACTED] | Advanced Static/Dynamic Code Auditing & Vuln Discovery Engine.



β–Œ 0x05.2_PROJECTS: CURRENT_OPERATIONS

Accessing Active Operation Repositories...

The following sectors represent the core of my offensive lifecycle. From the development of polymorphic logic to the forensic documentation of real-world intrusions.



Alderson Core Logo

Fsociety00_alderson_core.dat

[ THE ELITE ARSENAL ]

The central nervous system of weaponized logic. A curated repository of surgical exploits, Local Privilege Escalation (LPE) vectors, and specialized offensive tooling.

Focus: Weaponizing CVEs, Kernel-land exploitation, and custom malware engineering.

Fsociety_Operations_Logs.dat

[ THE METHODOLOGY ]

The forensic blueprint of every intrusion. This sector archives the full lifecycle of my operations, including screen recordings, raw terminal logs, and technical/executive reports.

Contents: Advanced machine writeups, vulnerability analysis, and step-by-step auditing methodologies.
Operations Logs Logo

β–Œ 0x06_LEGAL_DISCLAIMER

All data provided in this profile is for authorized security research and professional exhibition only. C0deGhost and the Fsociety team operate within legal frameworks of engagement. Unauthorized use of the knowledge contained here will be prosecuted.
"Control is an illusion. Data is the only truth."

WE ARE FSOCIETY. WE ARE FINALLY FREE. WE ARE FINALLY AWAKE.

Pinned Loading

  1. Fsociety00_alderson_core.dat Fsociety00_alderson_core.dat Public

    Hello, friend. This is the core. The logic they didn't want you to see. A curated collection of weaponized thoughts designed to dismantle the illusion of security. From low-level kernel panics to h…

    Python 2

  2. fsoc-ghost-0x fsoc-ghost-0x Public

    Config files for my GitHub profile.

  3. CVE-2025-9074_DAEMON_KILLER CVE-2025-9074_DAEMON_KILLER Public

    The Ultimate DAEMON_KILLER. Control is an illusion. This Exploit forces CVE-2025-9074 to break the Docker cage. Advanced Container Escape & Root Escalation toolkit. Verify the vulnerability, take t…

    Shell 1

  4. Fsociety-CVE-2025-24071-NTLM-Coercion Fsociety-CVE-2025-24071-NTLM-Coercion Public

    Hello friend. This is the Fsociety Exploit Framework for CVE-2025-24071. Generates malicious .library-ms files to steal NTLMv2 hashes. Includes a 'Living Terminal' Cinematic Mode, Deep Trace loggin…

    Python 2

  5. runc-breakout-fsociety runc-breakout-fsociety Public

    Exploit for Linux Privilege Escalation via Insecure Container Wrappers (e.g., runc). Automates the entire kill chain from rootfs creation to host pwnage. Inspired by Giveback @ HTB.

    Python 2

  6. Fsociety-CVE-2024-0670-CheckMK-LPE Fsociety-CVE-2024-0670-CheckMK-LPE Public

    Hello friend. This is the key to the kingdom. Advanced LPE exploit for CheckMK (CVE-2024-0670). Abuses insecure file handling for SYSTEM access. Includes surgical persistence module. Written in C++…

    C++ 1