> INITIALIZING HACKING_LAB.EXE...
HACKING LAB _
Cybersecurity Researcher · IoT Hacker · Embedded Dev
Hacker Logo
SCROLL
> WHOAMI
ABOUT ME _

💀 I'm a Cybersecurity Enthusiast from Kawardha, Chhattisgarh 🇮🇳 — focused on WiFi attacks, BadUSB payloads, and building tools that push boundaries.

📡 My playground is ESP8266, Raspberry Pi Pico, and low-level C/C++ — hardware that most people never touch.

🔐 I build ethical hacking tools and IoT security research projects — breaking things to understand them deeply.

🌱 Self-taught, relentlessly curious, and always learning. I thrive in the space where hardware meets security.

0
PROJECTS
0
LANGUAGES
ESP
8266 EXPERT
CURIOSITY
// SKILL MATRIX
📡 WiFi Security & Attacks 0%
🔌 ESP8266 / Embedded Systems 0%
🌐 IoT Development 0%
🦆 BadUSB / HID Payloads 0%
🐍 Python Scripting 0%
⚙️ C / C++ Programming 0%
> LS -LA /SKILLS
[ TECH ARSENAL ] _
// LANGUAGES
PYTHON
C
C++
// HARDWARE
ESP 8266 ESP8266
RP 2040 PI PICO
ARDUINO
ESP NodeMCU NODEMCU
// SECURITY
WIFI ATK
HID BADUSB
CAPTIVE
TROJAN
DEAUTH
// TOOLS & OS
K KALI
LINUX
WIRESHARK
GNU GCC GCC
VIM VIM
VSCODE
GIT
WiFi Security & Attacks90%
ESP8266 / Embedded Systems88%
Python Scripting80%
C / C++ Programming75%
IoT Development85%
BadUSB / HID Payloads82%
> GIT LOG --oneline
# PROJECTS _
PICO-RUBBER-DUCKY
BadUSB payload device using Raspberry Pi Pico. Emulates a keyboard to execute automated payloads silently on any target machine.
Python Pico
VIEW ON GITHUB →
TROJAN.COCKROACH
A stealthy Trojan/RAT built in C++ that survives like a cockroach. Persistent, lightweight and hard to detect — for educational research only.
C++
VIEW ON GITHUB →
ESP8266 CAPTIVE PORTAL
Evil Twin attack via ESP8266. Creates a fake WiFi access point with a captive portal that captures credentials from unsuspecting users.
C++ ESP8266
VIEW ON GITHUB →
WIFI PASSWORD STEALER
Silently extracts all saved WiFi credentials from Windows systems using Python. Outputs SSID and passwords in a clean format.
Python
VIEW ON GITHUB →
WIFI BLASTER
WiFi deauthentication tool — sends deauth packets to kick devices off any wireless network. Classic network security testing tool.
Linux
VIEW ON GITHUB →
FACE RECOGNITION ATTENDANCE
Smart IoT-based attendance system powered by face recognition. Built in C with real-time detection and automatic logging — no manual input needed.
C IoT
VIEW ON GITHUB →
> LS /DEV/HARDWARE
[ MY TOOLS ] _

Real hardware. Real exploits. Every project on this site was built and tested with these devices — hands-on, late-night, no simulation.

ESP8266 NodeMCU
TOOL_01

ESP8266 NodeMCU

The brain behind most attacks

My go-to WiFi attack board. Used for building captive portals, deauth jammers, and evil twin access points. Programs in C++ via Arduino IDE. Fits in your pocket. Terrifyingly powerful.

CPUTensilica L106 @ 80MHz RAM80 KB SRAM WiFi802.11 b/g/n GPIO11 digital pins
WiFi Attacks Captive Portal Deauth C++
Raspberry Pi Pico W
TOOL_02

Raspberry Pi Pico W

The silent keystroke injector

Disguised as a USB drive. Emulates a HID keyboard to execute payloads in seconds — no driver install, no alerts. The hardware behind my Rubber Ducky clone. Victim sees nothing. Payload runs everything.

CPURP2040 Dual-core @ 133MHz RAM264 KB SRAM WiFiCYW43439 2.4GHz USBHID / Mass Storage
BadUSB HID Inject MicroPython Payloads
I built, programmed and deployed every tool above myself — from flashing firmware to writing the attack scripts. All for learning. All for fun.
> PING SUNIL
CONTACT _

Want to collaborate on a security project, IoT build, or just talk hacking? Hit me up — I'm always open to connecting with fellow hackers and builders.

MESSAGE.SH
00:00:00
Initializing secure_channel... OK
Loading exploit_kit.sh......... OK
Establishing connection......... OK
Ready. Awaiting input........... READY
root@sunil:~$ name=
root@sunil:~$ email=
root@sunil:~$ msg=
root@sunil:~$ ./SEND_MESSAGE.SH
0%

THANKS FOR VISITING_

Hope you enjoyed the lab 🧪
Stay curious · Stay dangerous

root@sunil:~$