Skip to content
View VoidChecksum's full-sized avatar
🔬
Reverse Engineering / Exploit Research / Security Audits
🔬
Reverse Engineering / Exploit Research / Security Audits

Block or report VoidChecksum

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
VoidChecksum/README.md

Hi, I'm VoidChecksum 👋

🔐 Security Researcher | 🧩 Reverse Engineering | 🕷️ Penetration Testing | ⚙️ Agentic Security Tooling

Rust Python TypeScript Go C Bash Ghidra Burp Suite Nmap Frida AI Agents

I break systems only where I have authorization, then turn the evidence into root cause, impact, and practical fixes.

Currently deep in reverse engineering, exploit research, offensive-security labs, and AI-assisted tooling for faster security workflows.

Current Projects

  • 🏝️ vibe-island - A Dynamic Island for AI coding tools; cross-platform desktop UX in Rust.
  • 🩹 void-patcher-cc - Reverse-engineering notes and patch automation around Claude Code CLI bundles.
  • 🛰️ omniwire - Infrastructure layer for AI-agent swarms, MCP tooling, browser control, 2FA, VPN, and firewall experiments.
  • 🧰 UltraBuild - Cross-platform agentic harness for models, agents, and OS automation.
  • 📓 re-notes - Reverse engineering and security research notes.
  • 🧪 Vigilo - Web3 security research fork for bug bounties, audit contests, and exploit reasoning.
  • 🤖 Decepticon - Autonomous red-team testing lab fork for authorized workflow experiments.

What I'm Doing

  • Reverse engineering - Binary triage, patch diffing, runtime analysis, and trust-boundary mapping.
  • Penetration testing - Web/API testing, attack-surface discovery, auth/access-control review, and remediation validation.
  • Exploit research - Crash triage, safe PoC validation, fuzzing signals, and exploitability review in isolated labs.
  • Security audits - Evidence-driven findings with reproduction steps, impact, risk, and fixes engineers can ship.
  • Agentic workflows - Building tools that make security research faster while keeping scope, safety, and logs clear.

GitHub Activity

GitHub Contribution Graph

Connect

GitHub Discord TryHackMe ZeroShadowOps


Recognition

  • TryHackMe Top 1%.
  • Public work across reverse engineering, security automation, and AI-assisted developer tooling.
  • Focused on responsible disclosure, authorized testing, and reproducible evidence.

Philosophy

Scope first. Evidence always. Root cause over symptoms. Fixes that can actually ship.

Random Facts
  • I like tools that make security research repeatable.
  • I prefer clean repro steps over vague vulnerability claims.
  • I spend a lot of time in terminals, debuggers, disassemblers, proxies, and agent harnesses.
  • I am not available for unauthorized access, credential theft, spam, or destructive activity.

Pinned Loading

  1. omniwire omniwire Public

    Infrastructure layer for AI agent swarms — 88 MCP tools · A2A · OmniMesh VPN · Scrapling scraper · COC sync · nftables firewall · CDP browser · 2FA TOTP · ~80ms

    TypeScript 9 6

  2. PurpleAILAB/Decepticon PurpleAILAB/Decepticon Public

    Autonomous Hacking Agent for Red Team

    Python 3.5k 683

  3. void-patcher-cc void-patcher-cc Public

    Void Patcher for Claude Code v2.1.120 — 96 regex-signature patches for cli.js + Bun SEA (active-bundle + VFS-aware), auto-heal through every CC update

    Python 17 8

  4. Vigilo Vigilo Public

    Forked from PurpleAILAB/Vigilo

    An AI hacker for Web3 Smart Contract. for bug bounties, Audit contest, offensive security research, and real-world exploit thinking.

    TypeScript