ROBINX0
OFFENSIVE SECURITY · RED TEAM

IRFANUL MONTASIR.

OFFENSIVE SECURITY ENGINEER // SHORBORNO HOLDINGS // DUBAI, UAE

I work in offensive security - penetration testing, Active Directory exploitation, EDR bypass & AV evasion, source-code review, and building open-source offensive tooling for authorized engagements at Bangladesh's largest telco.

OPERATOR-PROFILE.ini
name Irfanul Montasir
handle robinx0
role Offensive Security Eng.
company Shorborno · Grameenphone
location Dubai, UAE · UTC+4
education B.Sc. CSE · IIUC '23
status open to collab
CLICK CARD TO VIEW PHOTO
IM
ROBINX0
CLICK TO FLIP BACK ↻
75+
Machines pwned
05
Certifications
CRTO · CPTS · eWPTX
eCPPT · eJPT
04
HTB pro labs
APT · Dante · Rasta · Asc.
#1·#2
CyberDrill ntl.
#31
BlackHat MEA '23
02
Publications
Featured projects
Open-source releases & research I'm shipping
All projects →
NoteNyx
NOTENYX · 2026
ALPHA

Electron-packaged knowledge workspace built for offensive security work. Markdown notes with a force-directed graph view, BloodHound AD viewer, and an integrated terminal in a single split-pane interface.

  • Markdown editor with graph view
  • BloodHound AD relationship viewer
  • Integrated terminal pane
  • Liquid Glass macOS icon system
ElectronReactViteTypeScript
#pentest#tooling#knowledge-base
allspray
ALLSPRAY · 2026
RELEASE

Web-based SSH credential spray and post-exploitation tool. CSV-driven scan, dedicated PE tab, AutoRoot with command placeholders, air-gapped compatible. Currently at v5.2.

  • FastAPI + WebSocket backend
  • CSV target ingestion
  • AutoRoot with _CMD_ placeholder
  • Air-gapped deployment
PythonFastAPIJavaScript
#red-team#ssh#post-exploitation
Recent writeups
Technique & methodology walkthroughs
View all →
Browse by category