Skip to content
View skeeminator's full-sized avatar
  • SkeemLabs
  • Sinnoh

Block or report skeeminator

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
skeeminator/README.md

skeem

Self-taught maldev — a bit of red team on the side, all of it with a lil AI-assistnce. aka skeeminator · SkeemLabs · founder of @Skeem-Team

Focus Role Vibe Coded


Stats

skeem's GitHub stats

Top Languages

GitHub Streak


Tech Stack

Languages

C C++ C# Python Go PowerShell Batch Bash TypeScript JavaScript HTML CSS ASM

Offensive Tooling / Maldev

Win32 WDK NTDLL Detours .NET WPF UEFI Polyglots

Tools & Infra

VS VSCode Git GitHub Docker Linux Windows


About

I'm skeem (aka skeeminator) — self-taught since 2022, building under the SkeemLabs banner. Maldev is the main thing; red team / pentest work on the side. Everything I publish is AI-assisted — I vibe code, and don't really care if you think that's bad. Natural-language programming with LLMs is an ever improving field and continues to change the world of Blue and Red Teamn work. The balance between obviously understanding what you are trying to create and providing details but also understanding not just how AI works but the psychology of how AI thinks is what will eventually show the difference between what makes a solid vibe coder compared to typical AI users. There is indeed knowledge, intelligence, and skill to produce quality work in generative LLMs, they are not a shortcut to make something without knowing nothing, and I'd rather help prove where it can go than pretend it doesn't exist.

Grew up on the early-2000s / 2010s Anonymous era and carried the same ideas with me: Showing the public how vulnerable we all are and how we are all exploited daily. Most of what I put out is meant to show regular people and researchers/hobbyists how fragile modern privacy actually is — the stuff that walks past the tools they trust. You can't defend against what you've never seen.


Why I Build

  • For the public, not a badge. Old-school hacker vibes. Expose the cracks so normal people can see them — not write another whitepaper for another agency to take advantage of against the people.
  • Pro-AI coding. Vibe coding is not cheating or worthless either, it really is just a barrior for turning natural human language into programmable code. More people shipping real software in their spoken language is a net positive, and I want to be one of the ones proving it.
  • Demystify offensive AI. A lot of people still doubt AI-written offensive code — both that it works, and that anyone using it is a real developer. I'd rather show what's actually possible than argue about it.
  • Not for mercs. Nothing I build is meant to help scammers, extorters, or anyone whose idea of fun is robbing regular people. That line's there for a reason.

Focus Areas

  • Static Evasion / Runtime Evasion / Crypting — PE manipulation, runtime unpacking, polymorphism indirect syscalls, etc.
  • Kernel development — WDK drivers, rootkits, callback removal, DSE/PatchGuard study
  • Bootkits & firmware — UEFI persistence, pre-OS execution
  • Polyglots & file-format abuse — parser-differential research
  • RATs, Stealers, C2 Development — client builders, plugin architectures, comms, operator UX
  • Detection engineering (inverse) — studying how AV/EDR behave and what gets caught and why

Connect

DMs open for collabs, bug reports, feature requests, or anything lab-related.


Disclaimer

Everything here is research and educational. I publish it so people can see what their systems are actually vulnerable to — not so anyone can turn it on regular folks. Lab-only or authorized targets only. Run it anywhere else and the consequences are yours, not mine.


⭐ If any of my public work helps you, a star is appreciated. 👤 Follow for continuous offensive-tooling drops.

Pinned Loading

  1. RINGW0RM RINGW0RM Public

    RINGW0RM is Ring0 rootkit and UEFI bootkit plugin formatted for PulsarRAT as a plugin, which was built upon a customized Chaos and Elysium combination (this was not planned to be dropped lol)

    C# 1

  2. GLOTTER GLOTTER Public

    GLOTTER is a simple PoC builder that produces jpeg/png and mp3 polyglots that retain function and execute payloads

    C#