Skip to content
View samay825's full-sized avatar
๐ŸŽฏ
Focusing
๐ŸŽฏ
Focusing

Block or report samay825

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this userโ€™s behavior. Learn more about reporting abuse.

Report abuse
samay825/README.md

โ˜ ๏ธ ZORK | POWERFUL CODER โ˜ ๏ธ

Typing SVG

Instagram BadgeYouTube BadgeTelegram Badge

๐ŸŒŸ [ABOUT ME] Code Architect and Innovator

Animated Typing SVG

Who Am I?

I am Zork, a passionate and self-taught Ethical Hacker, OSINT Expert, and Python3 Automation Specialist. Based in India, my expertise spans C, C++, JavaScript, Shell, and Python, where I build tools and solutions to bridge innovation with execution.


๐ŸŒŸ [VISION]

Vision Typing Animation

[โš ๏ธ] System Warning

[ALERT] Unauthorizedaccessdetected [WARN] Systemdefensescompromised [CRIT] Kernelpanicimminent [FATAL] Ghostprotocolinitiated

๐Ÿ› ๏ธ Tech Stack & Tools

Tech Stack


[๐Ÿ’€] Threat Matrix

[โ–บ] System Breach [โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–‘] 98% [โ–บ] Deep Infiltration[โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–‘โ–‘] 95% [โ–บ] Ghost Protocol [โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–‘โ–‘โ–‘] 92% [โ–บ] Data Extraction [โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–‘โ–‘โ–‘โ–‘] 88% 

๐Ÿ“ˆ GitHub Stats

GitHub StatsGitHub Streak


๐ŸŽญ [PHANTOM PROTOCOL]

Signal Trace: BLOCKEDSystem Access: ROOTDetection: VOID

[๐Ÿ”ช] Weapon Stack

BinaryPythonShellNetwork


[โš”๏ธ] Operation Status

[>>] Kernel Takeover [โ–ฐโ–ฐโ–ฐโ–ฐโ–ฐโ–ฐโ–ฐโ–ฐโ–ฐโ–ฑ] 95% โ €โ €โ˜ ๏ธโ €โ €โ €โ €โ €โ €โ €โ €โ €โ €โ €โ˜ ๏ธ [>>] Zero-Day Arsenal [โ–ฐโ–ฐโ–ฐโ–ฐโ–ฐโ–ฐโ–ฐโ–ฐโ–ฑโ–ฑ] 85% [>>] System Decimation [โ–ฐโ–ฐโ–ฐโ–ฐโ–ฐโ–ฐโ–ฐโ–ฐโ–ฑโ–ฑ] 80% [>>] Shadow Protocol [โ–ฐโ–ฐโ–ฐโ–ฐโ–ฐโ–ฐโ–ฐโ–ฐโ–ฐโ–ฑ] 90% 

[๐Ÿ•ท๏ธ] Digital Footprints

[X] Location : ENCRYPTED [X] Status : HUNTING [X] Target : ACQUIRING [X] Threat Level : CRITICAL 

Popular repositories Loading

  1. Sms-Bomb Sms-BombPublic

    This tool named "Sms-Bomb" is mainly use to prank friends with this , All working apis are present in the script , If you do any illegal activites through this script we are not responsible

    Python 347 87

  2. W0rm-Gpt W0rm-GptPublic

    This tool named "W0rm-GPT" is mainly use to research all activities which ChatGPT cant't give , All working apis are present in the script , If you do any illegal activites through this script we aโ€ฆ

    Python 292 77

  3. CallSpoofv3 CallSpoofv3Public

    This tool named "CallSpoof" is mainly used to prank with friends , All working apis are present in the script , If you do any illegal activites through this script we are not responsible

    Python 51 12

  4. Andro-OsInstaller Andro-OsInstallerPublic

    This tool named "Andro-OsInstaller" is mainly used to install os in android GUI , All working apis are present in the script , If you do any illegal activites through this script we are not responsโ€ฆ

    Python 25 4

  5. InstaXploit InstaXploitPublic

    A comprehensive security testing framework for educational and authorized penetration testing purposes

    Batchfile 24 4

  6. samay825 samay825Public

    Offensive Security Certified Professional

    19 2