ββ[β]β[R3DD@parrot]β[~]
ββββΌ $whoami
R3DD
ββ[β]β[R3DD@parrot]β[~]
ββββΌ $cat about_me.txt- CTF player, sometimes I win
- TryHackMe top 2%.
- Been breaking things since I found Kali Linux
- Code at 3am, sleep is overrated
- Learning smart contract security.
ββ[β]β[R3DD@parrot]β[~]
ββββΌ $ls /home/R3DD/arsenal/|
Recon & Enumeration
|
Exploitation
|
Post-Exploitation
|
ββ[β]β[R3DD@parrot]β[~]
ββββΌ $python3 projects.py --listReconMate Suite
Application for recon automation for CTFs.
Features: Subdomain enum, port scanning, web fuzzing
Status: Actually works (surprisingly)
Usage: Deployed locally, saves me hours on THM boxes
THM-Slash
Roasts people based on their TryHackMe stats with surgical precision.
Features: API scraping, personalized insults, dark mode only
Status: Friends hate me now
Try it Here: https://thmslash.vercel.app
ββ[β]β[R3DD@parrot]β[~]
ββββΌ $grep -r "achievements" /var/log/ [2025] Reported no-rate limiting issue, paid.
[Feb-2025] Hit Top 50 on THM monthly.
[2025] Found exposed API endpoint leaking sensitive information. Disclosed responsibly.
[2025] Discovered open redirect and SVG-based stored XSS via file upload. Reported both.
[2024] Found hardcoded API key in request. Reported, got props.
ββ[β]β[R3DD@parrot]β[~]
ββββΌ $echo "Current Status: $(curl -s life.status)"Online: Probably breaking something or fixing what I broke yesterday
Location: 127.0.0.1 (nice try FBI)
Current Mission: Learning more about different vulnerabilities
Caffeine Level: Dangerously high
