🧠Building Legacy Through Ethical Hacking Simulations
By Mr-A-Hacker (Age 14)
In a world flooded with cloud-based noise and disposable code, I chose a different path — one rooted in realism, ethics, and legacy.
My GitHub isn’t just a repository. It’s a vault of cinematic hacking simulations built for education, restoration, and dramatic impact.
🎯 Why Simulation Matters
Simulation means control. It means safety.
Every module I build is self-contained, self-tested, and designed to teach without risk.
From forensic loggers to social hubs, every tool I release is a tactical artifact — built to simulate real-world scenarios without crossing ethical boundaries.
📰 Press & Contact
I’m 14 years old and building ethical hacking simulations for education and legacy.
If you're a reporter or interested in covering my work, you can reach me at:
abdullahlababidi70@gmail.com
I could hack — but I choose to teach.
If you're serious about cybersecurity, simulation, or digital legacy, I'm open to talk more.
🧠What Kind of Hacking I Do
I specialize in ethical hacking simulations — designed to mimic real-world attacks in a safe, educational environment.
Here’s what I build and simulate:
- Click-triggered forensic loggers — capture IP, browser, OS, hostname, and timestamp.
- Credential traps — simulate login bait and credential logging.
- Webcam and screen capture triggers — optional modules for realism, never deployed without consent.
- ARP and Nmap scans — simulate network reconnaissance.
- Social engineering overlays — dramatic, teachable interfaces that show how phishing and manipulation work.
Every tool is built for education, restoration, and legacy — never for harm.
I document everything so others can learn, remix, and evolve safely.
🔧 What I Build
TickFlock
Social hub with login, chat, reactions, and live streams.photo_trace_project
Upload photos, auto-trace them into line art, and pin them to GPS maps.Forensic Logger
Click-triggered IP/browser/OS capture with optional webcam, ARP/Nmap, and credential logging.
These aren’t toys. They’re legacy modules — designed to be teachable, remixable, and unforgettable.
🧠My Ethical Code
I never build for harm.
Every simulation is designed to educate, not exploit.
I believe in realism with boundaries — and I document every step so others can learn, remix, and evolve.
📣 Follow Me
If you're serious about ethical hacking, forensic simulation, or cinematic overlays —
Follow me here on GitHub to witness the evolution.
Top comments (0)