Skip to content
View crackalove's full-sized avatar
πŸ‘Ύ
currently breaking something
πŸ‘Ύ
currently breaking something

Block or report crackalove

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
crackalove/README.md

header

Typing SVG

Β Β  followers


Mr Robot - Elliot Alderson

πŸ–€ π™°πš‹πš˜πšžπš π™ΌπšŽ

Hey. I'm crackalove β€” a self-taught security researcher, reverse engineer, and low-level systems programmer driven by one obsession: understanding how things really work under the hood.

It started simple β€” curiosity. Why does this crash? What does this binary actually do? How does the OS decide what runs and what doesn't? That curiosity turned into years of going deeper and deeper down the rabbit hole. Assembly language became readable. Disassemblers became familiar. Memory layouts stopped being scary. Now I spend most of my time in territory that most developers never touch β€” reading raw opcodes, analysing malware, writing exploit primitives, and building tooling to automate the dark arts.

I'm not a CTF kid farming points. I'm interested in real systems β€” how they're architected, where they fail, and why defenders keep losing. I study everything from heap exploitation and kernel attack surfaces to protocol analysis and network intrusion. My approach is methodical: understand the target deeply before touching it, enumerate everything, assume nothing.

My primary languages are C++ and Python. C++ for anything that needs to be fast, close to the metal, or interact with OS internals. Python for scripting, automation, quick exploit PoCs, and tooling glue. I'm comfortable in assembly (x86/x64 primarily) and can read ARM when needed. I also understand how compilers transform high-level code β€” which matters enormously when you're reversing something stripped of all symbols.

Beyond technical skills, I think the most important quality in this field is patience. The willingness to stare at a disassembly for three hours until the algorithm reveals itself. To run the same binary fifty times under different conditions. To read a 400-page architecture manual because one paragraph will explain the bug you found. Most people don't do that. That's why most people don't find what I find.

I'm currently going deeper on kernel exploitation, fuzzing (AFL++, libFuzzer), and malware analysis. Always building tools. Always breaking things. Always learning.

"Give a man a program, frustrate him for a day. Teach a man to program, frustrate him for a lifetime."


  • πŸ”­ Β  πš†πš˜πš›πš”πš’πš—πš πš˜πš— binary analysis tooling in C++
  • 🌱 Β  π™»πšŽπšŠπš›πš—πš’πš—πš kernel exploitation & OS internals
  • πŸ‘Ύ Β  π™Έπš—πšπš˜ malware analysis & reverse engineering
  • 🎯 Β  π™΅πš˜πšŒπšžπšœ low-level offensive security
  • πŸ’¬ Β  π™°πšœπš” πš–πšŽ πšŠπš‹πš˜πšžπš reversing, exploits, C++, Python
  • 🌐 Β  cracka.cfd
  • πŸ“‘ Β  πšƒπšŽπš•πšŽπšπš›πšŠπš– @UnRezolved
  • πŸ¦‰ Β  π™±πšŽπšœπš πš πš˜πš›πš” after midnight

πŸ› οΈ π™»πšŠπš—πšπšžπšŠπšπšŽπšœ

C++ Python C Bash


βš™οΈ πšƒπš˜πš˜πš•πšœ

π™³πš’πšœπšŠπšœπšœπšŽπš–πš‹πš•πšŽπš›πšœ & π™³πšŽπšŒπš˜πš–πš™πš’πš•πšŽπš›πšœ

IDA Pro Ghidra Binary Ninja radare2 Cutter RetDec Hopper angr

π™³πšŽπš‹πšžπšπšπšŽπš›πšœ

GDB pwndbg PEDA x64dbg OllyDbg WinDbg LLDB edb

π™΄πš‘πš™πš•πš˜πš’πšπšŠπšπš’πš˜πš—

Metasploit pwntools ROPgadget ropper one_gadget checksec exploitdb

π™΅πšžπš£πš£πš’πš—πš

AFL++ libFuzzer honggfuzz Boofuzz Peach

π™½πšŽπšπš πš˜πš›πš” & πšƒπš›πšŠπšπšπš’πšŒ

Wireshark Burp Suite Nmap tcpdump mitmproxy Scapy Nessus

π™±πš’πš—πšŠπš›πš’ π™°πš—πšŠπš•πš’πšœπš’πšœ & π™Όπš’πšœπšŒ

strace ltrace binwalk objdump readelf strings Frida Volatility YARA CyberChef

π™΄πš—πšŸπš’πš›πš˜πš—πš–πšŽπš—πš

Linux Git Docker Vim VSCode


πŸ“Š π™Άπš’πšπ™·πšžπš‹ πš‚πšπšŠπšπšœ

GitHub Streak


πŸ“ˆ π™²πš˜πš—πšπš›πš’πš‹πšžπšπš’πš˜πš— π™Άπš›πšŠπš™πš‘

activity graph


🀝 π™²πš˜πš—πš—πšŽπšŒπš

Website Telegram


if you want to talk β€” you know where to find me.
open to: collabs / research / interesting problems.
not open to: nonsense.

Mr Robot - Elliot

πšπš‘πšŽ πššπšžπš’πšŽπšπšŽπš› 𝚒𝚘𝚞 πš‹πšŽπšŒπš˜πš–πšŽ, πšπš‘πšŽ πš–πš˜πš›πšŽ 𝚒𝚘𝚞 πšŠπš›πšŽ πšŠπš‹πš•πšŽ 𝚝𝚘 πš‘πšŽπšŠπš›

footer

Pinned Loading

  1. nuitka-injector nuitka-injector Public

    Runtime injection framework for reverse engineering compiled Python applications (Nuitka, PyInstaller).

    Python 3

  2. telegram-mailing-bot telegram-mailing-bot Public

    Telegram Mailing: рассылка сообщСний ΠΏΠΎ списку Ρ‡Π°Ρ‚ΠΎΠ²

    Python 2

  3. patchscan patchscan Public

    PatchScan β€” Reverse engineering tool for detecting code changes between binary versions.

    Python 4