Skip to content
View QurtiDev's full-sized avatar
:shipit:
Web & AD
:shipit:
Web & AD

Organizations

@L3AK-TEAM

Block or report QurtiDev

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
QurtiDev/README.md

🔮 Developer | Cyber Sec Enthusiast | Red & Blue Team Learner 🔮


🔧 Minecraft Mod & Plugin Developer
💜 Kotlin Lover
👀 How to reach me?
- DM me on Discord: qurti.dll
- Or mail me: QurtiDev@proton.me


🦈 Currently: Diving deep into Red Teaming, Pentesting, and CTFs
🎯Mainly focusing on:
• Malware Analysis & Reverse Engineering
• Custom Tool & Software Development
• Red Team Planning & Strategy
• Windows AD & Azure Attacks
• Linux Exploitation
• Web Exploitation Techniques

Typing SVG

Logo

🌐 Socials:

Medium YouTube

🔓 TryHackMe:

TryHackMe Badge

Click for a free cookie!

💻 My Tech Interests

Programming Languages

Kotlin Java JavaScript Python C C++ C# Lua CSS PowerShell Bash LaTeX Nim


Security Tools Arsenal

Metasploit BurpSuite OWASP ZAP Wireshark Caido


Virtualization & OS

VirtualBox VMware Linux Debian Ubuntu Kali Linux Parrot Security Tails Arch Linux


Dev Tools & IDEs

IntelliJ IDEA Visual Studio Code Visual Studio Eclipse Obsidian


DBs & Cloud

MySQL SQLite Oracle DigitalOcean


📊 GitHub Stats:



🏆 GitHub Trophies


The Payload Knows Where It Is...

"The payload knows where it is at all times. It knows this because it knows where it isn't. By subtracting where it is from where it isn't, or where it was - if it isn't there, it obtains a deviation, or error in source data.
By having source data of deviation, the payload can then predict where it isn't going to be 100-400ms (Depending on network latency) from now. Without this data, the payload would simply be a blob of shellcode blindly spraying ROP chains into kernel space forever.
The payload knows this because the beacon operator told it. The operator knows because he read the MITRE ATT&CK matrix. Any deviation within acceptable bounds of EDR & AV evasion must be corrected before execution."

✍️ Random Dev Quote


💰 You can help me by Donating

PayPal

Logo

Popular repositories Loading

  1. Purpleware-AD-Scripts Purpleware-AD-Scripts Public

    Will be a collection of scripts I’ve written for Active Directory Exploitation to help automate stuff and (hopefully) make someone else's life easier!

    Python 6

  2. WSUS-CVE-2025-59287-RCE WSUS-CVE-2025-59287-RCE Public

    Exploit script written in C# to aid gaining a reverse shell on targets with Windows Server Update Service(WSUS) CVE-2025-59287.

    C# 3 3

  3. tookie-osint tookie-osint Public

    Forked from Alfredredbird/tookie-osint

    Tookie is a advanced OSINT information gathering tool that finds social media accounts based on inputs.

    Python 2

  4. nmap-http-banner-title nmap-http-banner-title Public

    Simple yet useful Nmap NSE script to detect HTTP services, grab server banners, and extract HTML page titles.

    Lua 2

  5. Purple-SysRepairToolkit Purple-SysRepairToolkit Public

    A collection of scripts and tools I've developed and refined for Windows system repair, suspicious file scanning!

    PowerShell 2

  6. AD-Pentesting-Tools-archive AD-Pentesting-Tools-archive Public

    Forked from theyoge/AD-Pentesting-Tools

    All about Active Directory pentesting

    PowerShell 2 1