Skip to content
View Wagonx's full-sized avatar

Block or report Wagonx

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
WagonX/README.md

CyberSec & Reverse Engineering

 ██████╗██╗   ██╗██████╗ ███████╗██████╗ ███████╗███████╗ ██████╗
██╔════╝╚██╗ ██╔╝██╔══██╗██╔════╝██╔══██╗██╔════╝██╔════╝██╔════╝
██║      ╚████╔╝ ██████╔╝█████╗  ██████╔╝███████╗█████╗  ██║     
██║       ╚██╔╝  ██╔══██╗██╔══╝  ██╔══██╗╚════██║██╔══╝  ██║     
╚██████╗   ██║   ██████╔╝███████╗██║  ██║███████║███████╗╚██████╗
 ╚═════╝   ╚═╝   ╚═════╝ ╚══════╝╚═╝  ╚═╝╚══════╝╚══════╝ ╚═════╝

Typing SVG

💻 About Me

class SecurityResearcher:
    def __init__(self):
        self.name = "YOUR_NAME"
        self.role = "Security Researcher / Reverse Engineer"
        self.language_spoken = ["en_US", "BINARY", "ASM"]
        self.specialty = ["Reverse Engineering", "Malware Analysis", "Exploit Development"]
        
    def skills(self):
        return {
            "reverse_engineering": ["IDA Pro", "Ghidra", "Radare2", "Binary Ninja", "x64dbg"],
            "languages": ["x86 Assembly", "C/C++", "Python", "Rust", "Go"],
            "exploitation": ["ROP", "Heap Exploitation", "Fuzzing", "Shellcode Development"],
            "malware_analysis": ["Static Analysis", "Dynamic Analysis", "Sandboxing", "Threat Hunting"],
            "networking": ["Wireshark", "Burp Suite", "Network Protocol Analysis"],
            "os_internals": ["Windows", "Linux", "macOS"]
        }
        
    def currently_breaking(self):
        return "Working on firmware security research and vulnerability discovery"

🛠️ Weapons of Choice

Assembly C C++ Python Rust IDA Pro Ghidra Radare2 GDB Kali Linux

🏆 CTF Achievements

  • WWHF Denver 2025: Ranked in top 3

📊 Stats

GitHub Stats Top Languages

📝 Latest Security Research & Writeups

Coming Soon....

⚡ Active On

HackTheBox TryHackMe Medium Twitter LinkedIn


Profile Views
01010011 01100101 01100011 01110101 01110010 01101001 01110100 01111001 00100000 
01101001 01110011 00100000 01100001 00100000 01110000 01110010 01101111 01100011 
01100101 01110011 01110011 00101100 00100000 01101110 01101111 01110100 00100000 
01100001 00100000 01110000 01110010 01101111 01100100 01110101 01100011 01110100

Pinned Loading

  1. eps32-23Bin2Elf eps32-23Bin2Elf Public

    Python