Skip to content
View youmulijiang's full-sized avatar
  • Guangdong Industry ang Trade

Block or report youmulijiang

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
youmulijiang/README.md

Hi there 👋

Typing SVG

YoumuliJiang

Security Researcher | Red Team Operator | Vulnerability Hunter
Exploring the unknown, breaking boundaries, and securing the digital world — one vulnerability at a time.


🛠️ Roles & Expertise

  • Red Team Operator – Simulating real-world attacks to strengthen defenses
  • Blue Team Strategist – Building resilient security architectures and threat detection systems
  • Bug Bounty Hunter – Hunting for critical vulnerabilities across web, mobile, and infrastructure
  • Reverse Engineer – Dissecting malware and analyzing binary exploits
  • Tool Developer – Crafting custom tools for automation, exploitation, and forensic analysis
  • Threat Hunter – Proactively tracking adversaries and uncovering hidden threats
  • Software Developer – Building secure and scalable applications with robust code architecture

🚀 Mission

"To challenge the conventional, uncover the unseen, and secure the future — one exploit, one patch, one system at a time."


🔥 Current Focus

  • Developing advanced offensive security tools
  • Exploring novel exploitation techniques in cloud and container environments
  • Contributing to open-source security projects
  • Sharing knowledge through research blogs and conference talks

📫 Connect With Me


"In the world of ones and zeros, I seek the truths hidden in between."
– YoumuliJiang

Popular repositories Loading

  1. HaeToYakit HaeToYakit Public

    HaeToYakit是一个将hae配置文件转换为yakit适配的配置文件脚本

    Python 83 3

  2. pdf-js-inject pdf-js-inject Public

    pdf-js-inject,能够将js代码注入到pdf文件中,也可以注入xss-payload到pdf文件中

    Python 27 2

  3. BpArsenal BpArsenal Public

    BpArsenal, a Burp Suite plugin that can quickly convert http requests into command-line tool execution, launch third-party tools and open related websites, can improve the efficiency of penetration…

    Java 20 2

  4. ZTdns ZTdns Public

    一个快速扫描dns域传输漏洞的脚本(ZTdns is a quick script to scan for DNS zone transfer vulnerabilities)

    Python 14

  5. webfind webfind Public

    一个高效多线程,插件化的web敏感信息收集器

    Python 10

  6. evil-winrar evil-winrar Public

    evil-winrar,CVE-2023-38831漏洞利用和社会工程学攻击框架 (evil-winrar, CVE-2023-38831 Vulnerability Exploitation and Social Engineering Attack Framework)

    Python 9 2