Skip to content
View 3xpl01777's full-sized avatar
🖥️
🖥️

Block or report 3xpl01777

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
3xpl01777/README.md

3 X P L 0 1 7

🕷️ Breaking things since 2014

I'm a Software Engineer specialized in Cybersecurity with a focus on Pentesting, Bug Bounty Hunting, and I'm also an open-source enthusiast. This profile is a showcase of my work, research, and contributions to the cybersecurity community.

Areas of Expertise

  • Full-Stack Development: Backend specialist with Go. Frontend with React, TypeScript, and Next.js;

  • Offensive Security: Web application Pentesting, Network Pentesting, and Cloud Security;

  • Incident Response: Skilled in detecting and mitigating security incidents;

  • Malware Analysis: Reverse engineering malware and analyzing behavior in isolated environments;

  • OSINT: Deep knowledge of Open-Source Intelligence gathering and analysis;

  • Bug Bounty Hunter: Active participant in platforms like HackerOne, BugCrowd, and Synack;

  • Capture The Flag (CTF): Frequent participant in CTF competitions for sharpening my hacking skills;

Development Stack

go logo rust logo python logo typescript logo javascript logo nodejs logo java logo jquery logo react logo nextjs logo svelte logo html5 logo css3 logo tailwindcss logo bootstrap logo django logo anaconda logo jupyter logo mongodb logo postgresql logo mysql logo sqlite logo graphql logo firebase logo express logo redis logo docker logo apachekafka logo gradle logo jenkins logo grafana logo amazonwebservices logo azure logo npm logo yarn logo webpack logo git logo linux logo debian logo vscode logo

Security Stack

  • Pentesting: Burp Suite, OWASP ZAP, Nmap, Metasploit Framework, SQLmap, Nikto, Gobuster, Hydra, Wireshark, John the Ripper, Responder, BloodHound, Impacket, Dirbuster;

  • Malware Analysis: IDA Pro, Ghidra, OllyDbg, Procmon, PEiD, Cuckoo Sandbox, FakeNet, YARA;

  • Phishing: I build my own custom phishing websites to ensure realism and control over the vectors. With that, I still use tools such as BeEF, Gophish, and King Phisher;

  • Additional Tools: Recon-ng, Sublist3r, Amass, theHarvester, Aircrack-ng, Hashcat;

Methodologies

  • OWASP Top 10: Focus on identifying and exploiting web vulnerablities;

  • MITRE ATT&CK: Mapping attack techniques to real-world scenarios;

  • NIST Cybersecurity Framework: Implementing security standards and best practices;

Contact Me

I prefer to keep things low-key and anonymous. For any inquiries related to pentesting, bug bounty, or malware analysis, feel free to contact me via DM on HackerOne or BugCrowd under the alias 3xpl01777, or through the email on this profile.

Popular repositories Loading

  1. 3xpl01777 3xpl01777 Public