Skip to content
View 0x57Origin's full-sized avatar

Block or report 0x57Origin

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
0x57Origin/README.md
                          )                       
     )     (  (      ) ( /(                       
  ( /(    ))\))(  ( /( )\()) (  (  (  ( (         
  )\())( /((_)()\ )\()|(_)\  )( )\ )\))()\  (     
 ((_)\ )\()|()((_|(_)\  ((_)(()((_|(_))((_) )\ )  
 /  (_|(_)\ | __|__  / / _ \ ((_|_)(()(_|_)_(_/(  
| () |\ \ / |__ \ / / | (_) | '_| / _` || | ' \)) 
 \__/ /_\_\ |___//_/   \___/|_| |_\__, ||_|_||_|  
                                  |___/           

0x57Origin · he/him

Cybersecurity student interested in CTFs and security tooling. Currently learning through hands-on projects and coursework. Master’s student in Cybersecurity

0x57Origin@proton.me


Current Interests

  • Reverse engineering fundamentals (Ghidra)
  • Building beginner-friendly CTF challenges
  • Introductory malware analysis in lab environments
  • Learning low-level networking concepts
  • Writing small security tools in Nim, C, and C++

Projects

  • NimPacket A learning-focused packet manipulation library for Nim that works with Ethernet, IPv4, TCP, UDP, and ICMP.

  • Flag_Hunt A small collection of beginner reverse engineering challenges designed to practice basic Ghidra workflows.

  • RE_VAULT Personal repository for reverse engineering exercises, experiments, and notes.

  • PenTest-WriteUps Notes and write-ups documenting labs, CTFs, and cybersecurity learning progress.


Links


GitHub

  • Pull Shark – Opened and merged pull requests
  • Regular commits across learning projects and experiments

Still learning, still experimenting, and documenting progress as I go.

Pinned Loading

  1. Flag_Hunt Flag_Hunt Public

    A small C binary filled with five beginner-friendly reverse engineering challenges that teach basic Ghidra skills, XOR decoding, and simple logic analysis.

    C 3 1

  2. PenTest-WriteUps PenTest-WriteUps Public

    My personal library of cybersecurity writeups, notes, and learning progress & TryHackMe!

    C++

  3. RE_VAULT RE_VAULT Public

    Repository for all my reverse-engineering work, including custom challenges, training artifacts, and experimental C-based obfuscation projects & Malware Development & Analysis.

    C

  4. NimPacket NimPacket Public

    Low-level packet manipulation library for Nim that lets you build and parse Ethernet, IPv4, TCP, UDP, and ICMP as structured data instead of raw bytes.

    Nim 31