Skip to content
View geevarghesekthomas84-sys's full-sized avatar
:octocat:
🔒 In build mode
:octocat:
🔒 In build mode

Block or report geevarghesekthomas84-sys

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

❖ GEEVARGHESE K THOMAS (GG) ❖

Offensive Security Researcher & Tool Developer

Status Clearance Location

Typing SVG



▓▒░ EXECUTIVE SUMMARY ░▒▓

Highly specialized offensive security researcher focusing on advanced persistent threat (APT) simulation, exploit development, and evasion techniques. Architect of enterprise-grade security tools and comprehensive training environments.


▓▒░ ARSENAL & CAPABILITIES ░▒▓

Offensive Ops Development Infrastructure Blue/DFIR


Cobalt Strike / Sliver
BloodHound / BloodHound.ad
Metasploit / Burp Suite
Impacket / Responder
Nmap / Wireshark
Proxmark3 / Flipper Zero


Python / Go / Rust
C / C++ / Assembly
Bash / PowerShell
JS / Node.js
SQL / Git


Active Directory (AD/AAD)
AWS / Azure / GCP
Docker / Kubernetes
Terraform / Ansible
Network Security / VPN


Wazuh / Splunk / ELK
Sysmon / Windows Event Logs
Volatility / Autopsy
Suricata / Snort / Zeek
Threat Hunting / UEBA

▓▒░ RECENT DEPLOYMENTS ░▒▓

Status: 🟢 Active | Class: Enterprise Defense

Full-stack Blue Team environment simulating a privileged data breach. Complete with 50+ custom rules mapped to MITRE ATT&CK.

Status: 🟢 Active | Class: Offensive Tooling

Sleek, web-based payload generator featuring 25+ reverse shell variants. Wrapped in a premium hacker UI for rapid deployment.

Status: 🟢 Active | Class: Knowledge Base

The ultimate curated collection of offensive security tools, C2 frameworks, and execution techniques.

Status: 🟢 Active | Class: Field Operations

Drop-and-run offensive toolkit. Automated recon via Nmap/Nuclei combined with an offline AI hacking assistant.


▓▒░ TELEMETRY ░▒▓





"I don't break things. I find ways in."

Pinned Loading

  1. PortSight PortSight Public

    A high-performance, multithreaded TCP port scanner with service detection and differential scan comparison.

    Python 2

  2. Flipper-HighFi-Login-Portals Flipper-HighFi-Login-Portals Public

    High-fidelity captive portal UI research templates for Flipper Zero and web security labs, featuring self-contained Apple, Google, Facebook, and Amazon login mockups with responsive HTML/CSS/JS and…

    HTML 1 1

  3. flipper-zero-evil-portals flipper-zero-evil-portals Public

    High-quality, mobile-optimized captive portals for the Flipper Zero Evil Portal app.

    HTML 1

  4. LocalLens LocalLens Public

    A high-performance local file search engine built with Node.js, SQLite FTS5, and Worker Threads.

    JavaScript 1

  5. Portable-Offline-LLM Portable-Offline-LLM Public

    Run a fully private, offline AI assistant from a USB flash drive — no installation, no internet, no admin rights required.

    Batchfile 1

  6. GhostKit GhostKit Public

    👻 A portable cybersecurity suite for USB deployment — featuring AI-assisted network auditing (Nmap), web vulnerability scanning (Nuclei), packet analysis (Wireshark), and an offline AI Security Ass…

    Python 2