π§ Building Legacy Through Ethical Hacking Simulations
By Mr-A-Hacker (Age 14)
In a world flooded with cloud-based noise and disposable code, I chose a different path β one rooted in realism, ethics, and legacy.
My GitHub isnβt just a repository. Itβs a vault of cinematic hacking simulations built for education, restoration, and dramatic impact.
π― Why Simulation Matters
Simulation means control. It means safety.
Every module I build is self-contained, self-tested, and designed to teach without risk.
From forensic loggers to social hubs, every tool I release is a tactical artifact β built to simulate real-world scenarios without crossing ethical boundaries.
π° Press & Contact
Iβm 14 years old and building ethical hacking simulations for education and legacy.
If you're a reporter or interested in covering my work, you can reach me at:
abdullahlababidi70@gmail.com
I could hack β but I choose to teach.
If you're serious about cybersecurity, simulation, or digital legacy, I'm open to talk more.
π§ What Kind of Hacking I Do
I specialize in ethical hacking simulations β designed to mimic real-world attacks in a safe, educational environment.
Hereβs what I build and simulate:
- Click-triggered forensic loggers β capture IP, browser, OS, hostname, and timestamp.
- Credential traps β simulate login bait and credential logging.
- Webcam and screen capture triggers β optional modules for realism, never deployed without consent.
- ARP and Nmap scans β simulate network reconnaissance.
- Social engineering overlays β dramatic, teachable interfaces that show how phishing and manipulation work.
Every tool is built for education, restoration, and legacy β never for harm.
I document everything so others can learn, remix, and evolve safely.
π§ What I Build
TickFlock
Social hub with login, chat, reactions, and live streams.photo_trace_project
Upload photos, auto-trace them into line art, and pin them to GPS maps.Forensic Logger
Click-triggered IP/browser/OS capture with optional webcam, ARP/Nmap, and credential logging.
These arenβt toys. Theyβre legacy modules β designed to be teachable, remixable, and unforgettable.
π§ My Ethical Code
I never build for harm.
Every simulation is designed to educate, not exploit.
I believe in realism with boundaries β and I document every step so others can learn, remix, and evolve.
π£ Follow Me
If you're serious about ethical hacking, forensic simulation, or cinematic overlays β
Follow me here on GitHub to witness the evolution.
Top comments (0)