Skip to content
View nietowl's full-sized avatar
🔥
On demon time
🔥
On demon time

Block or report nietowl

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
nietowl/README.md

Typing SVG

╔══════════════════════════════════════════════════════════════════════════════╗
║                                                                              ║
║   ██████╗  █████╗ ██████╗ ██╗  ██╗    ██╗    ██╗███████╗██████╗              ║
║   ██╔══██╗██╔══██╗██╔══██╗██║ ██╔╝    ██║    ██║██╔════╝██╔══██╗             ║
║   ██║  ██║███████║██████╔╝█████╔╝     ██║ █╗ ██║█████╗  ██████╔╝             ║
║   ██║  ██║██╔══██║██╔══██╗██╔═██╗     ██║███╗██║██╔══╝  ██╔══██╗             ║
║   ██████╔╝██║  ██║██║  ██║██║  ██╗    ╚███╔███╔╝███████╗██████╔╝             ║
║   ╚═════╝ ╚═╝  ╚═╝╚═╝  ╚═╝╚═╝  ╚═╝     ╚══╝╚══╝ ╚══════╝╚═════╝              ║
║                        H U N T E R                                           ║
║                                                                              ║
╚══════════════════════════════════════════════════════════════════════════════╝

> whoami

┌──(nietowl㉿kali)-[~/darkweb]
└─$ cat /etc/passwd/nietowl

IDENTITY: Pranav Darwai
ALIAS: nietowl
CLEARANCE: ████████ CLASSIFIED ████████
LOCATION: Bengaluru, India [12.9716° N, 77.5946° E]
STATUS: Active | Hunting

SPECIALIZATION:
├── Dark Web Intelligence & Threat Hunting
├── Penetration Testing & Red Team Operations  
├── OSINT & Social Engineering
├── Malware Analysis & Reverse Engineering
└── IoT Security & Embedded Systems

MISSION: Infiltrate. Analyze. Secure.

> cat /proc/skills

╭─────────────────── OFFENSIVE ARSENAL ───────────────────╮
│                                                          │
│  ▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓ Python      ████████████░░ 90%   │
│  ▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓ Go          ██████████░░░░ 75%   │
│  ▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓ C/C++       ████████░░░░░░ 65%   │
│  ▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓ Bash        █████████████░ 95%   │
│  ▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓ SQL Inject  ████████████░░ 85%   │
│                                                          │
╰──────────────────────────────────────────────────────────╯

[EXPLOITATION TOOLS]

Kali Tor Metasploit Burp Suite Wireshark Nmap

[LANGUAGES & PLATFORMS]

Python Go C++ Bash Linux Docker


> ./breach_stats.sh

⚠️  DISCLAIMER: What you see here is just the tip of the iceberg.
    The critical tools and research remain in private repositories.
    Some things are better left in the shadows... 🔒

> netstat -hunt

┌──(nietowl㉿kali)-[~]
└─$ netstat -hunt

Proto  Address                    Status      Description
─────────────────────────────────────────────────────────────────
TCP    twitter.com/Ni3tOwl        ESTABLISHED Social Intel
TCP    linkedin.com/pranav-darwai ESTABLISHED Professional Network  
TCP    medium.com/@nietowl        ESTABLISHED Knowledge Sharing
TCP    buymeacoffee.com/nietowl   LISTENING   Support Channel

Active Connections: 4

Twitter LinkedIn Medium Buy Me A Coffee


> cat /var/log/current_ops.log

+ [ACTIVE] Dark Web Intelligence Gathering
+ [ACTIVE] Building OSINT Tools in Go
+ [ACTIVE] Hunting Threat Actors
! [PENDING] Collaboration on Security Research
- [TERMINATED] Sleep Schedule
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣀⣀⣀⣀⣀⣀⣀⣀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⣠⣴⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣦⣄⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⣠⣾⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣷⣄⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⢀⣾⣿⣿⣿⣿⣿⣿⠋⢀⣀⠀⠙⣿⣿⣿⣿⣿⣿⣿⣷⡀⠀⠀⠀⠀
⠀⠀⠀⢠⣿⣿⣿⣿⣿⣿⣿⣿⠀⣾⣿⣷⠀⣿⣿⣿⣿⣿⣿⣿⣿⣿⡄⠀⠀⠀
⠀⠀⢠⣿⣿⣿⣿⣿⣿⣿⣿⣿⣧⠙⠿⠋⣼⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⡄⠀⠀
⠀⢀⣿⣿⣿⣿⠿⠟⠛⠛⠛⠻⠿⢿⣶⣿⠿⠟⠛⠛⠛⠻⠿⣿⣿⣿⣿⣿⡀⠀
⠀⣼⣿⣿⠋⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠙⣿⣿⣿⣧⠀
⢰⣿⣿⠃⠀⠀⠀⣀⣀⣀⡀⠀⠀⣠⣶⣄⠀⠀⢀⣀⣀⣀⠀⠀⠀⠘⣿⣿⣿⡆
⢸⣿⣿⠀⠀⠀⣼⣿⣿⣿⣿⠀⠀⣿⣿⣿⡇⠀⣿⣿⣿⣿⣧⠀⠀⠀⣿⣿⣿⡇
⢸⣿⣿⡀⠀⠀⢿⣿⣿⣿⡿⠀⠀⠙⠿⠟⠁⠀⢿⣿⣿⣿⡿⠀⠀⢀⣿⣿⣿⡇
⠀⢿⣿⣧⠀⠀⠀⠙⠛⠋⠀⠀⠀⠀⠀⠀⠀⠀⠀⠙⠛⠋⠀⠀⠀⣼⣿⣿⡿⠀
⠀⠈⢿⣿⣷⣄⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣠⣾⣿⣿⡿⠁⠀
⠀⠀⠀⠻⣿⣿⣷⣦⣀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣀⣴⣾⣿⣿⣿⠟⠀⠀⠀
⠀⠀⠀⠀⠈⠛⢿⣿⣿⣿⣷⣶⣶⣤⣤⣤⣤⣶⣶⣿⣿⣿⣿⡿⠛⠁⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠉⠛⠿⢿⣿⣿⣿⣿⣿⣿⣿⣿⡿⠿⠛⠉⠀⠀⠀⠀⠀⠀⠀
    
         ANONYMOUS | VIGILANT | RELENTLESS

> cat /etc/motd

╔═══════════════════════════════════════════════════════════════╗
║                                                               ║
║  "I don't break into systems to destroy them...               ║
║   I break in to show you how to protect them."                ║
║                                                               ║
║                              - nietowl                        ║
║                                                               ║
╚═══════════════════════════════════════════════════════════════╝

👁️ SURVEILLANCE COUNT


Pinned Loading

  1. TeleHuntX TeleHuntX Public

    TeleHuntX: Your Ultimate Telegram Message Search Tool! Unleash lightning-fast searches, explore message details, and find hidden gems in Telegram conversations. Contribute and discover more! 🚀🔍🌟

    Python 10

  2. wifi_deauther_esp8266 wifi_deauther_esp8266 Public

    The WiFi Deauther ESP8266 is a simple tool designed to perform WiFi deauthentication attacks. It is specifically developed for the ESP8266 microcontroller unit (MCU).

    C++

  3. BLUR_DETECTION_bot BLUR_DETECTION_bot Public

    Many digital images contain blurred regions which are caused by motion or defocus. Automatic detection and classification of blurred image regions are very important for different multimedia analyz…

    Python 5 1

  4. Advance_key_logger_malware Advance_key_logger_malware Public

    The Advance Key Logger Malware project is a sophisticated keylogging application designed for educational and research purposes. This tool captures keystrokes on Windows operating systems, enabling…

    Python 1

  5. excel_automation excel_automation Public

    The Excel Automation project offers a set of scripts and tools to automate common tasks in Microsoft Excel. This project is designed to help users save time and improve productivity by reducing the…

    Python 1