Neo-virex profile picture
Addis Ababa, ET
+251 960045028

Security Researcher


Hi! 👋 I'm Abraham (Neo), a cybersecurity l0veR focused on security-testing and defensive & offensive security. I create automation scripts, CTF challenges, and tools to speed up hacking.

Outside tech, I enjoy running (23+ medallions) and writing CTF writeups & project insights.

⚡ Fun Facts: I don't drink coffee • I automate everything • Dream: build a top-tier CTF pentesting toolkit.

~/coursework_

Education and professional training.

Skill Surge Academy

Web & Security Trainee

Cybersecurity Certification — May 2025

Hack The Box

Remote Security Tester

Offensive labs and real-world machine challenges.

TryHackMe

Cybersecurity Learner

Top 1% global rank across all learning paths.

St. Mary's University

BSc Computer Science

Ongoing — Expected graduation 2025.

~/projects_

Core offensive tools, automation frameworks, and web platforms.

Neo-Recon

Automated reconnaissance and exploitation framework. Streamlines target enumeration, OSINT gathering, and report generation.

PythonNmapOSINT
Bunna-CTF preview

Bunna-CTF

Attack simulation toolkit for CTF challenge development and red-team exercises. Includes custom flag systems and scoring.

PythonBashCTF
Virex preview

Virex

Offensive security research tool exploring malware behaviour and evasion techniques in controlled lab environments.

PythonCMalware Analysis
Priv-Esc preview

Priv-Esc

Privilege escalation scripts and techniques collection for Linux and Windows, used in CTF and penetration testing.

BashPythonLinux

Abr-ahamis-tools

Collection of custom security scripts including AutoScan.py, BruteForce.sh, and PortWatcher for automated offensive tasks.

PythonBashNmap
Keyloggers preview

Python & C Keyloggers

Educational keylogger implementations in Python and C demonstrating input capture techniques for security research.

PythonCWindows API

Network.py

Python network utility library for packet crafting, port scanning, and traffic analysis in penetration testing workflows.

PythonScapySockets
Image Stego Encryptor preview

Image-Stego-Encryptor

Hides and extracts secret messages inside image files using steganography combined with AES encryption.

PythonSteganographyAES

~/old-projects_

Earlier work from the GitHub archive — view all repos

aes-extract

aes-extract

Extracts and analyzes AES keys from memory dumps and packet captures for forensic investigation.

PythonCryptographyForensics
pcap-extracte

pcap-extracte

Parses PCAP files to extract credentials, files, and session data. Useful for CTF and network forensics challenges.

PythonWiresharkPCAP
GPSSimulator

GPSSimulator

GPS location spoofing simulator for security research into location-based authentication vulnerabilities.

PythonGPSSpoofing
Firewall-project

Firewall-project

Custom Linux firewall implementation using iptables and Python for automated rule management and traffic filtering.

PythoniptablesLinux
Encrypting Decrypting

Encrypting & Decrypting

Encryption and decryption utility covering common algorithms (AES, RSA, Caesar) for learning and CTF purposes.

PythonAESRSA
Image Encryption

Image Encryption

Pixel-level image encryption tool that scrambles image data using XOR and AES techniques.

PythonPILXOR
Password Checker

Password Checker

Checks password strength and checks against Have I Been Pwned database to detect compromised credentials.

PythonHIBP APISHA-1
Katoolin

Katoolin

Fork of Katoolin — script to install Kali Linux tools on Debian/Ubuntu systems for security testing environments.

BashKali ToolsLinux
TryHackMe writeups

TryHackMe Writeups

Collection of detailed CTF writeups and room solutions from TryHackMe — documenting techniques and methodologies.

CTFMarkdownTryHackMe
Web Project

Web-project

Full-stack web development project built during security training, demonstrating modern frontend and backend practices.

HTMLCSSJavaScript

~/blog_

Writeups, research notes and tutorials. View all posts

Tools 2025-02-20

Neo-Recon: Automating the Recon Phase

Deep dive into the Neo-Recon framework — how automated OSINT collection and port scanning are tied together into one workflow.

OSINTPythonAutomation
Writeup 2024-12-01

TryHackMe Top 1% — My Learning Path

How I approached the TryHackMe platform, what rooms I focused on, and the techniques that helped me break into the top 1%.

CTFTryHackMeMethodology

~/about_

bash — 80×24

> cat bio.txt

Security researcher and developer at the intersection of offensive security and infrastructure automation. I build tools, break systems ethically, and document everything.


> tail -n 3 focus.log

[Offensive] Custom exploitation tooling and phishing simulations.
[Defensive] Zero-trust architecture and SIEM pipeline tuning.
[Dev] Python, Bash, web platforms, and automation frameworks.


> echo $STATUS

Available for collaboration and opportunities.