About
Hello world.
Welcome to my blog!1
2
3
4
5
6printf("Hello world.\n");
std::cout << "Hello world." << std::endl;
print('Hello world.')
Console.WriteLine("Hello world.");
System.out.println("Hello world.");
fmt.Println("Hello world.")
Self-introduction

My name is Issac, and I am interested in cybersecurity, networking, technology, and both human languages and programming languages. I speak Mandarin, Cantonese, and English, and I have a basic level of Spanish, Japanese, and Korean.
I have been studying cybersecurity since middle school. I initially focused on web security, including web shells, databases, remote code execution, and web exploitation. Recently, I have been studying C2/RAT (Remote Access Tools) and exploits——not only how to use existing tools, but also how to write them. I believe these are essential parts of penetration testing, and it is necessary to understand their underlying principles.
People often say that instead of trying to build tools from scratch, we should use tools developed by others. Of course, this approach is useful, as those tools are built by professionals. However, from my perspective, everyone who is capable of building professional tools also started somewhere.
Quick Links
Recent Thoughts
- GitHub 100+ followers: After Reaching 100+ GitHub Followers: Something I Want to Say
Series
- RAT Analysis: Inside Different Generations of RATs
About this blog
This blog is my personal knowledge base, a place where I can keep tracking of my progress and share some cool things I have been working on. Whether you are new to this field or professional or anime meme lover, I hope you will find something interesting or useful here!
Tips
- Type is NOT Category:
| Type | Description |
|---|---|
| Code | Provided code for related topic. |
| Tool | Provided or introduced the usage for the tool. |
| Learning | Describe a concept/Solving practical problem. |
| Troubleshooting | Solving practical issues. |
| Note | Keeping notes for a domain while studying. |
| Book | Keeping notes for a book while studying. |
| Blackhat | Write something about offensive/defensive skills |
| Thoughts | Nonsense…? |
Idea of cybersecurity skills
I love coding and penetration testing and hacking skills, not because they are fun or make me look cool, but because they are powerful—almost like a superpower.
However, power is often abused. Once people obtain power, they may be tempted to misuse it. That is why we must understand the meaning and responsibility behind power; otherwise, we are no different from animals——or criminals.
Murmur
There is no fixed update schedule, as my availability depends on my time, mood, and mental state.
⚠️ Personal thoughts — please read gently (click this)
Recently active repos
| Project | Description |
|---|---|
| DuplexSpy | A GUI-based Windows remote access tool written in C#. |
| EgoDrop | An experimental GUI-based Linux/Windows remote access tool. |
| Eden-RAT | An open-source Linux GUI-based Remote Access Tool developed in C# with a Python payload, intended for legitimate penetration testing and reconnaissance tasks. |
| dotNetPELoader | A C#-based PE loader for both x64 and x86 PE files. |
| OpenShell | A lightweight, open-source reverse shell management server written in Go. |
| IronPE | A Windows PE manual loader written in Rust for both x86 and x64 PE files. |
| Elfina | A multi-architecture ELF loader supporting x86 and x86-64 binaries. |
| Alien | A web shell management tool. I am planning to rewrite it, as the previous version was poorly designed. |
Skills and Learning
Frameworks
- .NET
- JavaFx
- NuGet
IDEs
- Arduino IDE
- Eclipse
- IntelliJ IDEA
- Vim
- Visual Studio
- Visual Studio Code
OS
- Debian
- Ubuntu
- Fedora
- Kali
- Linux
- Windows 10
- Windows 11
- Windows XP
Programming Languages
- C
- C#
- C++/Win32 APi C++
- Python
- Perl
- PHP
- ASP
- ASP.NET
- Go-lang
- Rust
- PowerShell
- Java
- JavaScript
- Verilog
- RISC-V
- MASM
- NASM
- Matlab
Human Languages
- Mandarin
- Cantonese
- English
- Spanish
- Japanese
- Korean
Others
- Concurrency programming.
- Raspberry PI
- Lock picking.
Cybersecurity
- Web Pentesting
- Domain Pentesting (AD/Cobalt Strike/Armitage/Metasploit)
- Network Programming
- Reverse Engineering (IDA/Ghidra)
- Shellcode
- Industrial security
Interest
- Practical/Offensive Cybersecurity
- Remote Access Tool
- Exploitation
- Tool Development
Cute Anime Girl
Recently Reading / Recommended Books
| Name | Description |
|---|---|
| C++20 for Programmers: An Objects-Natural Approach | A book of C++ 20 programming. |
| 域滲透攻防指南 | A book of Windows domain(AD) pentesting. |
| 逆向工程核心原理(이승원) | This book introduces the principles and nutshells of reverse engineering, the original version is written in Korean. |
| The TCP/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference | An excellent book for understanding the principle of TCP/IP. |
| Windows 軟體安全實務 — 緩衝區溢位攻擊 | It introduces the practical aspect of buffer overflow. |
| 防火牆和VPN技術與實踐 | This books introduces the principle and practical implementation of VPN and firewall. |
THANKS FOR YOU READING