Self-taught maldev — a bit of red team on the side, all of it with a lil AI-assistnce. aka skeeminator · SkeemLabs · founder of @Skeem-Team
I'm skeem (aka skeeminator) — self-taught since 2022, building under the SkeemLabs banner. Maldev is the main thing; red team / pentest work on the side. Everything I publish is AI-assisted — I vibe code, and don't really care if you think that's bad. Natural-language programming with LLMs is an ever improving field and continues to change the world of Blue and Red Teamn work. The balance between obviously understanding what you are trying to create and providing details but also understanding not just how AI works but the psychology of how AI thinks is what will eventually show the difference between what makes a solid vibe coder compared to typical AI users. There is indeed knowledge, intelligence, and skill to produce quality work in generative LLMs, they are not a shortcut to make something without knowing nothing, and I'd rather help prove where it can go than pretend it doesn't exist.
Grew up on the early-2000s / 2010s Anonymous era and carried the same ideas with me: Showing the public how vulnerable we all are and how we are all exploited daily. Most of what I put out is meant to show regular people and researchers/hobbyists how fragile modern privacy actually is — the stuff that walks past the tools they trust. You can't defend against what you've never seen.
- For the public, not a badge. Old-school hacker vibes. Expose the cracks so normal people can see them — not write another whitepaper for another agency to take advantage of against the people.
- Pro-AI coding. Vibe coding is not cheating or worthless either, it really is just a barrior for turning natural human language into programmable code. More people shipping real software in their spoken language is a net positive, and I want to be one of the ones proving it.
- Demystify offensive AI. A lot of people still doubt AI-written offensive code — both that it works, and that anyone using it is a real developer. I'd rather show what's actually possible than argue about it.
- Not for mercs. Nothing I build is meant to help scammers, extorters, or anyone whose idea of fun is robbing regular people. That line's there for a reason.
- Static Evasion / Runtime Evasion / Crypting — PE manipulation, runtime unpacking, polymorphism indirect syscalls, etc.
- Kernel development — WDK drivers, rootkits, callback removal, DSE/PatchGuard study
- Bootkits & firmware — UEFI persistence, pre-OS execution
- Polyglots & file-format abuse — parser-differential research
- RATs, Stealers, C2 Development — client builders, plugin architectures, comms, operator UX
- Detection engineering (inverse) — studying how AV/EDR behave and what gets caught and why
- Telegram (personal): @skeeminator
- Channel — SkeemLabs: @skeemlabs
- Collaborative Team: @Skeem-Team
DMs open for collabs, bug reports, feature requests, or anything lab-related.
Everything here is research and educational. I publish it so people can see what their systems are actually vulnerable to — not so anyone can turn it on regular folks. Lab-only or authorized targets only. Run it anywhere else and the consequences are yours, not mine.
⭐ If any of my public work helps you, a star is appreciated. 👤 Follow for continuous offensive-tooling drops.

