Skip to content
booting aegis-os…

Command Palette

Search for a command to run...

Online·aegis-net

visitor@aegissoft:~$

AegisSoft/ a.k.a MrSpy00

> Cybersecurity enthusiast, software developer, community leader.

To break a system, you must first understand how it was built. I work on offensive security, Linux and open-source software.

status
Open to new work
loc
Türkiye
hint
Ctrl+K
aegis@portfolio:/etc/banner
kernelaegis-6.6.lts
shell/bin/zsh
archx86_64
uptime
[01]cat /etc/aegis/about.md

$ whoami

Cybersecurity Enthusiast & Software Developer

aegis@portfolio:/etc/aegis/about.mdtty/0
aegis@portfolio:~$ cat /etc/aegis/about.md

01Hi — I'm AegisSoft, also known as MrSpy00. I'm an enthusiast working across cybersecurity, systems programming and game development.

02My focus is offensive security research, custom Linux distributions and building open-source tooling. Building and leading teams and communities is a meaningful part of my craft.

03For me, time spent in front of a terminal is the purest form of practicing the craft.

EOF

./focus
Offensive Security
./system
Arch / Kali / Parrot
./lang
Rust · Go · Python · TS
./topics
Red Team · OSINT · GameDev
$ echo "focus → execution → community"
focus → execution → community
[02]aegis skills --list --interactive

$ skill matrix

Interactive map of the domains I work in — pick a category.

aegis-skill --category=cybersecurity
  • $ 01Penetration Testing
  • $ 02Red Team Operations
  • $ 03OSINT & Recon
  • $ 04Web Application Security
  • $ 05Network Security
  • $ 06Reverse Engineering
  • $ 07Malware Analysis
  • $ 08Exploit Development
  • $ 09Cryptography
  • $ 10Social Engineering

man aegis-skills

Pick a category to see related capabilities.

  • >10
  • >10
  • >10
  • >8
  • >8
  • >8
[03]ls -la /opt/arsenal/

$ arsenal

Tools and techniques in my daily rotation.

  • $nmap
    recon

    Network discovery & port scanning

  • $masscan
    recon

    Internet-scale port scanner

  • $amass
    recon

    Attack surface mapping

  • $subfinder
    recon

    Subdomain discovery

  • $ffuf
    recon

    Web fuzzing & content discovery

  • $burp suite
    exploit

    Web app proxy & testing

  • $metasploit
    exploit

    Exploitation framework

  • $sqlmap
    exploit

    Automated SQL injection

  • $hydra
    exploit

    Network login cracker

  • $john
    exploit

    Password cracking

  • $hashcat
    exploit

    GPU-accelerated cracking

  • $wireshark
    forensics

    Network protocol analyzer

  • $volatility
    forensics

    Memory forensics framework

  • $autopsy
    forensics

    Digital forensics platform

  • $snort
    defense

    Network IDS/IPS

  • $suricata
    defense

    Threat detection engine

  • $osquery
    defense

    OS as a high-perf relational DB

  • $kali linux
    os

    Penetration testing distro

  • $parrot os
    os

    Security & privacy OS

  • $arch linux
    os

    Lightweight & customizable distro

  • $docker
    dev

    Containerization platform

  • $git
    dev

    Distributed version control

  • $neovim
    dev

    Hyperextensible text editor

  • $tmux
    dev

    Terminal multiplexer

> Tooling adapts to the mission and context.

[04]git log --oneline --all

$ projects

A curated set of open-source work.

  • active
    featured
    $

    DirectFast

    // High-performance direct access utility

    A direct-access utility built for speed and secure operations under heavy workloads.

    • #performance
    • #cli
    • #systems
    main+latest
    feat: optimize core path
    chore: bump deps
  • active
    featured
    $

    OmniCore

    // Modular core framework

    A modular and extensible core framework for service orchestration and reusable module integration.

    • #framework
    • #modular
    • #core
    main+latest
    feat: optimize core path
    chore: bump deps
  • active
    featured
    $

    CQVE

    // Vulnerability research toolkit

    A CVE and vulnerability research toolkit focused on automated workflows and actionable reporting.

    • #cybersecurity
    • #cve
    • #research
    main+latest
    feat: optimize core path
    chore: bump deps
  • active
    featured
    $

    CodexCore

    // Code intelligence engine

    An engineering intelligence engine for code analysis and developer workflow acceleration.

    • #developer-tools
    • #analysis
    • #engine
    main+latest
    feat: optimize core path
    chore: bump deps
[05]tail -f /var/log/aegis/experience.log

$ timeline

A few highlights from my journey.

  1. [01]chapterOK

    Community Leadership & Team Management

    Building, growing and operating communities focused on software and cybersecurity. Mentorship, processes and team coordination.

  2. [02]chapterOK

    Offensive Security Research

    CVE analysis, exploit research and custom tooling for Red Team operations.

  3. [03]chapterOK

    Linux Distributions & System Hardening

    Configuring pentest-focused distros, kernel hardening and integration of custom tooling.

  4. [04]chapterOK

    Software & Game Development

    Systems programming, network services, performance-focused libraries and work on game engines.

[06]./aegis connect

$ contact

Ready to connect?

aegis@portfolio:/var/lib/contactinteractive
// Type "help" to see available commands.
aegis@portfolio:~$
help · list available commandsabout · who am Iprojects · list projectstheme · switch themeclear · clear the screen