Skip to content
View xdrew87's full-sized avatar

Block or report xdrew87

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
xdrew87/README.md

visitors

 ██████╗ █████╗ ██╗      ███╗   ███╗██╗  ██╗
██╔════╝██╔══██╗██║      ████╗ ████║╚██╗██╔╝
██║     ███████║██║      ██╔████╔██║ ╚███╔╝ 
██║     ██╔══██║██║      ██║╚██╔╝██║ ██╔██╗ 
╚██████╗██║  ██║███████╗ ██║ ╚═╝ ██║██╔╝ ██╗
 ╚═════╝╚═╝  ╚═╝╚══════╝ ╚═╝     ╚═╝╚═╝  ╚═╝

Typing SVG


whoami

class xdrew87:
    alias      = "galmx"
    role       = ["Cybersecurity Engineer", "OSINT Specialist", "Red Team Developer"]
    location   = "The Terminal"
    languages  = ["Python", "C++", "C#", "JavaScript", "Bash"]
    
    specializations = {
        "OSINT"          : "Multi-source intel, profiling, digital forensics",
        "Red Team"       : "Authorized testing, C2 frameworks, deployment automation",
        "Network Sec"    : "Protocol analysis, packet inspection, anomaly detection",
        "Automation"     : "N8N workflows, API pipelines, security tooling",
        "Intelligence"   : "Threat correlation, pattern recognition, analytics",
    }
    
    metrics = {
        "tools_built"    : "15+",
        "lines_of_code"  : "50K+",
        "downloads"      : "100K+",
        "platforms"      : "6+",
        "integrations"   : "9+",
        "years_active"   : "4+",
    }
    
    def __init__(self):
        self.mission = "Build tools that turn data into intelligence."

🛠 Arsenal & Expertise

Category Tools & Technologies
🐍 Languages Python C++ C# JavaScript Bash
🔴 Red Team / Exploitation Metasploit Nmap OWASP Burp Suite
🕵️ OSINT & Recon Shodan TheHarvester Maltego Custom Tools
🌐 Network Security Wireshark tcpdump Zeek Snort
☁️ Infrastructure Linux Kali Docker Kubernetes Windows
Automation & APIs N8N GitHub Actions FastAPI REST Webhooks
🗄️ Data & Intelligence SIEM Log Analysis Threat Intel

📡 GitHub Intelligence

Stats Top Languages
xdrew87's GitHub Stats Top Langs

GitHub Streak

📈 Contribution Activity

Activity Graph


🏆 Achievements

Trophies


🚀 Flagship Projects

Project Description Links
☠️ SuicixdalEXE All-in-one OSINT & network toolkit · 50K+ downloads · zero deps · single .EXE Repo
🌐 OSINT Intelligence Platform Enterprise intel suite · 9+ integrations · real-time data · sub-second queries Platform · API
🔍 TRID Multi-source intel app · username & email verification · social media profiling Repo
🔭 Argus Real-time threat detection · log aggregation · SIEM integration · SOC-ready Repo
🔨 PulseStrike Authorized stress testing · C2 framework · multi-threaded · compliance-ready Repo
🌍 FrostedServices Lab infrastructure · VPN/C2 hosting · 99.9% uptime · multi-region Platform · Docs
API Platform Full-stack security APIs · <100ms response · Python/Node/Go SDKs · N8N-ready Platform · Docs
📸 Instagram Analyzer v2 AI profile analysis · 24h cache · batch 100+ · adaptive rate limiting Repo

🐍 Contribution Grid

github-snake

⚙️ Enable the snake by adding this GitHub Action to your profile repo


⚖️ Security Code of Conduct

╔══════════════════════════════════════════════════════════════════╗
║              AUTHORIZED USE ONLY — READ BEFORE USE              ║
╚══════════════════════════════════════════════════════════════════╝

All tools, platforms, APIs, and code in this profile are built exclusively for:

Permitted Prohibited
Authorized penetration testing with written consent Unauthorized access to systems or networks
Cybersecurity education & research Illegal surveillance or stalking
CTF competitions & sandboxed lab environments Doxxing, harassment, or targeted abuse
OSINT on yourself or consented parties Malicious use against individuals or organizations
Red team engagements with signed scope agreements Distribution of tools for criminal activity
Security hardening & vulnerability disclosure Bypassing security controls without authorization

🔐 Responsible Disclosure

If you discover a vulnerability in any of my projects:

  1. Do NOT open a public issue — report privately first
  2. 📧 Email: [email protected] with subject [VULN] <project-name>
  3. Include: description, reproduction steps, impact assessment
  4. Allow 72 hours for acknowledgment before any public disclosure
  5. Credit will be given to all responsible reporters

📜 Ethical Use Pledge

if not has_written_authorization():
    raise PermissionError("Stop. You do not have permission to proceed.")

if target not in [your_own_systems, consented_targets, ctf_environments]:
    raise EthicsViolation("This tool is not for you.")

# By using any tool in this profile, you agree:
assert usage == "ethical"
assert testing == "authorized"
assert purpose in ["education", "research", "authorized_pentest"]

Legal Notice: You are solely responsible for ensuring your use of these tools complies with all applicable local, state, federal, and international laws. Misuse is a violation of the Computer Fraud and Abuse Act (CFAA), GDPR, and equivalent legislation worldwide. The author assumes zero liability for misuse.


📡 Links & Contact

     

     


// Everything I build is for ethical hacking, authorized testing, and cybersecurity education only.
// "Security is not a product, but a process." — Bruce Schneier

Pinned Loading

  1. DeathStress DeathStress Public

    Death Stress is an advanced layer 4 and layer 7 stresser built for rigorous network stress testing and load simulation.

    Python

  2. VeilStrike VeilStrike Public

    VeilStrike is a Python OSINT tool that detects if websites are behind CDNs like Cloudflare, resolves IPv4/IPv6 addresses, identifies web servers, and uncovers origin IPs. Supports JSON output and c…

    Python 1

  3. TraceScope TraceScope Public

    “Multi-source intelligence and network reconnaissance toolkit”

    Python 1

  4. abuse-reporter abuse-reporter Public

    A powerful command-line interface for reporting malicious IP addresses to AbuseIPDB without leaving your terminal. Features an elegant interactive menu, bulk reporting capabilities, and comprehensi…

    Python 1

  5. argus argus Public

    ARGUS v1.0 — A modular Python-based CLI security intelligence platform featuring threaded scanning, threat visibility, structured reporting, and interactive ASCII animations. Designed for ethical s…

    Python

  6. Echos Echos Public

    Echos is a stealthy C2 traffic emulator built in Rust for Red Teamers. It simulates adversarial beaconing patterns and custom jitter to test EDR/NDR detection logic. Ideal for validating network se…

    Rust 31 1