Skip to content
View marcostolosa's full-sized avatar
👽
Memento Mori.
👽
Memento Mori.

Sponsoring

@tmux

Block or report marcostolosa

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
marcostolosa/README.md

👋 Hello friend, I'm Marcos Tolosa (aka Tr0p)

Typing SVG

Profile Views

🌐 Socials:

Discord LinkedIn Gmail Twitch Twitter YouTube


I've been in the trenches of Offensive Security - i'm a red teamer, bug bounty hunter, reverse engineer and I really like automating the boring part. My brain is wired differently (ASD Level 1), giving me the hyperfocus needed to dismantle complex threats and then teach others how they tick. I don't just find vulnerabilities; I tear them apart to understand their core.

  • 🧠 I don't just hack; I teach what I learn: Offensive techniques, binary reversing, and application security, etc - from the attacker's perspective.
  • 🌎 Always hunting: When I'm not on an engagement, you'll find me owning boxes on HTB, HackerOne, Intigritti, THM, pwn.college, and pretty much any other platform worth its salt (Crackmes.one, MalwareBazaar, DEFCON, etc.).

💻 Tech Stack:

Go Markdown PowerShell Python Shell Script Windows Terminal AWS Azure DigitalOcean Google Cloud Apache Nginx Docker


Haze-Linux Haze-Python Haze-Powershell Haze-Bash Haze-C Haze-Nmap Haze-JavaScript Haze-Burp Haze-GitHubActions Haze-Tmux Haze-Golang Haze-Cloudflare Haze-mysql Haze-terraform Haze-selenium Haze-tensorflow Haze-scikitlearn Haze-metasploit Haze-vim Haze-kubernetes Haze-Android Haze-Apple Haze-HuggingFace Haze-OpenSource Haze-Wireshark Haze-Pepe Haze-Kali Haze-Obsidian Haze-VirusTotal Haze-Pandas

🧠 My Playground

  • Red Teaming & APT Emulation

  • Exploit Development & Reverse Engineering

  • AI/ML in Offensive Security

    • Authored Tools: ARCTAX, MANW-NG, riskIA-service, OSCP Insights, REload.Me, etc.
  • Advanced AppSec & DevSecOps

  • Cloud Security & Secure Architecture

  • My Go-To Stack:

    • Heavy Hitters: BurpSuite Pro, pwntools, Frida, Radare2/Rizin, Ghidra, IDA Pro, x64/x32dbg, Impacket, ffuf, naabu/nuclei, Nmap, CrackMapExec, BloodHound, tshark, Havoc, Cobalt Strike, mitmproxy.
    • Languages of Choice: Python for everything, Bash and PowerShell for speed, C/C++ when I need to get close to the metal and JavaScript to run everywhere.
    • Techniques: If it can be scripted, I automate it. Advanced Regex, Semgrep, CodeQL, and custom scripts are part of my workflow.

Pinned Loading

  1. manw-ng manw-ng Public

    A command-line tool for extracting Win32 API documentation from Microsoft and call functions.

    Python 13 1

  2. OCRack OCRack Public

    High-performance PDF translation tool featuring PaddleOCR for maximum text extraction with optimized prompts, automatic chapter detection, smart chunking, checkpoint/resume system, and comprehensiv…

    Python 6 2

  3. arctax arctax Public

    AI bypass prompt generator with ML + Uncensored local LLM.

    Python 2

  4. mindsecurity/REload.Me mindsecurity/REload.Me Public

    REload.Me – The most easy reverse engineer classroom.

    Python 1

  5. SecLists SecLists Public

    Forked from danielmiessler/SecLists

    SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sensitive data grep strin…

    PHP 1 1

  6. PayloadsAllTheThings PayloadsAllTheThings Public

    Forked from swisskyrepo/PayloadsAllTheThings

    A list of useful payloads and bypass for Web Application Security and Pentest/CTF

    Python