I'm a Software Engineer specialized in Cybersecurity with a focus on Pentesting, Bug Bounty Hunting, and I'm also an open-source enthusiast. This profile is a showcase of my work, research, and contributions to the cybersecurity community.
-
Full-Stack Development: Backend specialist with Go. Frontend with React, TypeScript, and Next.js;
-
Offensive Security: Web application Pentesting, Network Pentesting, and Cloud Security;
-
Incident Response: Skilled in detecting and mitigating security incidents;
-
Malware Analysis: Reverse engineering malware and analyzing behavior in isolated environments;
-
OSINT: Deep knowledge of Open-Source Intelligence gathering and analysis;
-
Bug Bounty Hunter: Active participant in platforms like HackerOne, BugCrowd, and Synack;
-
Capture The Flag (CTF): Frequent participant in CTF competitions for sharpening my hacking skills;
-
Pentesting: Burp Suite, OWASP ZAP, Nmap, Metasploit Framework, SQLmap, Nikto, Gobuster, Hydra, Wireshark, John the Ripper, Responder, BloodHound, Impacket, Dirbuster;
-
Malware Analysis: IDA Pro, Ghidra, OllyDbg, Procmon, PEiD, Cuckoo Sandbox, FakeNet, YARA;
-
Phishing: I build my own custom phishing websites to ensure realism and control over the vectors. With that, I still use tools such as BeEF, Gophish, and King Phisher;
-
Additional Tools: Recon-ng, Sublist3r, Amass, theHarvester, Aircrack-ng, Hashcat;
-
OWASP Top 10: Focus on identifying and exploiting web vulnerablities;
-
MITRE ATT&CK: Mapping attack techniques to real-world scenarios;
-
NIST Cybersecurity Framework: Implementing security standards and best practices;
I prefer to keep things low-key and anonymous. For any inquiries related to pentesting, bug bounty, or malware analysis, feel free to contact me via DM on HackerOne or BugCrowd under the alias 3xpl01777, or through the email on this profile.