Skip to content
View Karmaz95's full-sized avatar
๐ŸŽ
๐ŸŽ

Organizations

@afine-com

Block or report Karmaz95

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this userโ€™s behavior. Learn more about reporting abuse.

Report abuse
Karmaz95/README.md

๐Ÿ‘จโ€๐Ÿ’ป ย About Me

I am the Head of Research at AFINE, specializing in macOS security. I am passionate about vulnerability research, exploit development, and reverse engineering. My work focuses on macOS internals. I also work as an Offensive Security Engineer, developing tools to enhance security operations, identifying vulnerabilities in Desktop/Web applications, Active Directory, and creating malware to bypass EDRs.


๐Ÿ”ญ Projects

I created some resources for Offensive Security work:

  • Snake&Apple - A good place to start your journey with macOS Security.
  • Crimson - A good place to start your journey with Web Application Security.

๐Ÿ› CVE

Some bugs received public recognition.


๐Ÿ“– Blog & YT

I wrote on Medium. Now I am writing on Patreon, AFINE blog and for Phrack. Sometimes I post Proof of Concepts as short recordings on YouTube. You can subscribe using the banners below to receive notifications of the latest blogs or videos.

Patreon Medium YouTube


๐ŸŽ–๏ธ Certs & CTFs & Courses


๐Ÿ“ซ Social Media

Please feel free to reach me on any of the platforms I've shared below. I also share new articles there, so you can stay up-to-date by following me.

X LinkedIn Mastodon


๐Ÿ’ฐ Funding

If you want to dive deeper into Apple vulnerability research, consider becoming an Elite Patreon to gain access to exclusive content.

Patreon

Pinned Loading

  1. Snake_Apple Snake_Apple Public

    Articles and tools related to research in the Apple environment (mainly macOS).

    Python 231 26

  2. crimson crimson Public

    Web Application Security Testing Tools

    Python 250 52

  3. evasion evasion Public

    AV Evasion Techniques

    C# 79 20

  4. crimson_cracking crimson_cracking Public

    All around cracking wordlist.

    29 5

  5. macOS_HR_bypass_net_maui macOS_HR_bypass_net_maui Public

    Proof of Concept that shows vulnerability in Hardened Runtime protections on macOS via apps built in the Microsoft .NET MAUI framework.

    Shell 1