Skip to content

marcostolosa/marcostolosa

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

44 Commits
 
 

Repository files navigation

👋 Hello friend, I'm Marcos Tolosa (aka Tr0p)

Typing SVG

I'm a red teamer, pentester, bug bounty hunter, reverse engineer and I really like automating the boring part. My brain is wired differently (ASD Level 1), giving me the hyperfocus needed to dismantle complex threats and then teach others how they tick. I don't just find vulnerabilities; I tear them apart to understand their core.

  • I don't just hack; I teach what I learn: Offensive techniques, binary reversing, and application security, etc - from the attacker's perspective.
  • Always hunting: When I'm not on an engagement, you'll find me owning boxes on HTB, THM, researching with BugCrowd, HackerOne, Intigritti and learning more from pwn.college, malops and pretty much any other platform worth its salt (Crackmes.one, MalwareBazaar, DEFCON, etc.).

🛡️ Vulnerability Research & Disclosures

  • CVE-2025-10230 (CVSS 10.0): Discovered a critical OS Command Injection vulnerability in Samba hidden for 13 years.
  • CVE-2025-67503 (CVSS 8.2): Discovered a high Cross-Site Scripting (XSS) Reflected vulnerability in WeGIA platform.
  • Samba CTDB: Reported a Buffer Overflow vulnerability in the InfiniBand wrapper due to unsafe string handling.

🌐 Socials:

Discord LinkedIn Gmail Twitch Twitter YouTube


💻 Tech Stack:

Go Markdown PowerShell Python Shell Script Windows Terminal AWS Azure DigitalOcean Google Cloud Apache Nginx Docker

🧠 My Playground

  • Red Teaming & APT Emulation

  • Exploit Development & Reverse Engineering

  • AI/ML in Offensive Security

    • Authored Tools: ARCTAX, MANW-NG, riskIA-service, OSCP Insights, REload.Me, etc.
  • Advanced AppSec & DevSecOps

  • Cloud Security & Secure Architecture

  • My Go-To Stack:

    • Heavy Hitters: BurpSuite Pro, pwntools, Frida, Radare2/Rizin, Ghidra, IDA Pro, x64/x32dbg, Impacket, ffuf, naabu/nuclei, Nmap, CrackMapExec, BloodHound, tshark, Havoc, Cobalt Strike, mitmproxy.
    • Languages of Choice: Python for everything, Bash and PowerShell for speed, C/C++ when I need to get close to the metal and JavaScript to run everywhere.
    • Techniques: If it can be scripted, I automate it. Advanced Regex, Semgrep, CodeQL, and custom scripts are part of my workflow.

Haze-Linux Haze-Python Haze-Powershell Haze-Bash Haze-C Haze-Nmap Haze-JavaScript Haze-Burp Haze-GitHubActions Haze-Tmux Haze-Golang Haze-Cloudflare Haze-mysql Haze-terraform Haze-selenium Haze-tensorflow Haze-scikitlearn Haze-metasploit Haze-vim Haze-kubernetes Haze-Android Haze-Apple Haze-HuggingFace Haze-OpenSource Haze-Wireshark Haze-Pepe Haze-Kali Haze-Obsidian Haze-VirusTotal Haze-Pandas

snake gif


Profile Views

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published