A selection of my recent work, from security tools to web applications. All projects are open-source and available on GitHub.
This is a custom Go-based botnet project I developed for educational and research purposes. The project focuses on creating a lightweight, modular botnet structure with command-and-control (C2) features.
This is my custom Network Metrics Dashboard for real-time server stats like CPU, RAM, disk, and network. It's self-hosted, lightweight, and built to scale with an SDK coming soon for easy third-party integration.
Gostress-Tor-V2 is a tool I built to simulate stress testing using Tor for anonymity. It helps evaluate how well a system handles high traffic while keeping the source hidden through the Tor network.
Better-Golang-Net is a custom Go networking library I developed to improve and simplify low-level socket operations. It's designed for flexibility and performance, offering cleaner abstractions for TCP/UDP handling while maintaining full control over connections with basic implement of strong persistance.
Gostress-V2 is an open-source command and control (C2) framework developed in Go, intended for authorized penetration testing and security research. It provides encrypted TLS communication, role-based access control, a real-time dashboard, and client health monitoring.
GoDDos-Html is a project that I developed to demonstrate a simple Distributed Denial of Service (DDoS) tool using the Go programming language. The project features an HTML interface that allows users to interact with the tool through a web browser.
A sleek weather dashboard with real-time weather and forecasts using the OpenWeather API, displaying intuitive data visualizations with security-focused implementation.
An interactive finance dashboard demo with secure transaction logging and budget planning features, implementing best practices for financial data security.
A VPN demo platform with secure dashboard, subscription management, and test payment options for Stripe and PayPal, showcasing secure payment implementations.
Detailed Hack The Box challenge solutions and methodology documentation, demonstrating penetration testing techniques and security analysis skills.
A simulated SSH server designed as a honeypot with AbuseIPDB integration for logging unauthorized access attempts and analyzing attack patterns.
My technical toolkit includes a wide range of programming languages, frameworks, and security tools that I use to build secure and efficient solutions.
Interested in collaborating or have questions about my work? Feel free to reach out through any of these channels.
By accessing this website, you agree to be bound by these terms of service, all applicable laws and regulations, and agree that you are responsible for compliance with any applicable local laws.
All projects and code repositories on this website are open-source and are licensed under the MIT License unless explicitly stated otherwise in the project repository.
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files, to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:
The materials and code on Birdo.uk website are provided on an 'as is' basis. While efforts are made to ensure the quality and security of the code, Birdo makes no warranties, expressed or implied, and hereby disclaims and negates all other warranties including, without limitation, implied warranties or conditions of merchantability, fitness for a particular purpose, or non-infringement of intellectual property or other violation of rights.
Many projects on this website, particularly those related to security testing and network tools, are intended for educational purposes and legitimate testing scenarios. Users must:
We collect information that you voluntarily provide to us when you:
The information we collect is used to:
We implement appropriate security measures to protect your personal information. However, no method of transmission over the Internet or electronic storage is 100% secure, and we cannot guarantee absolute security.
We use cookies and similar tracking technologies to track activity on our website and hold certain information. You can instruct your browser to refuse all cookies or to indicate when a cookie is being sent.
We may employ third-party companies and individuals to:
If you have any questions about these Terms of Service or Privacy Policy, please contact us at:
Email: admin@birdo.uk
Last updated: January 12, 2025