Skip to content
View filipi86's full-sized avatar
👽
Hacking is NOT a crime
👽
Hacking is NOT a crime

Block or report filipi86

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
filipi86/README.md

Profile Views

image

I've been working as a Senior Threat and Security Researcher and CyberSecurity Advocate.

Snake animation

Skill & Languages & Tools 🛠

CyberSecurity  RedTeam  Security  ThreatHunting  MalwareAnalysis  BlueTeam  SecurityResearches  AppSec  Python  Shell  PowerShell  Docker  Git  GitHub  GitHub Actions  CircleCI  MySQL  Visual Studio Code  Linux  MacOS  Markdown 

Analytics ⚙️

Github Languages

Github Statistics

Github Contributions

Let's connect? 🤝

Projects ⚙️

Pinned Loading

  1. CVE-2024-6387-Vulnerability-Checker CVE-2024-6387-Vulnerability-Checker Public

    This Python script checks for the CVE-2024-6387 vulnerability in OpenSSH servers. It supports multiple IP addresses, URLs, CIDR ranges, and ports. The script can also read addresses from a file.

    Python 92 17

  2. MalwareAnalysis-in-PDF MalwareAnalysis-in-PDF Public

    Malicious PDF files recently considered one of the most dangerous threats to the system security. The flexible code-bearing vector of the PDF format enables to attacker to carry out malicious code …

    198 25

  3. horusec-demo horusec-demo Public

    Some examples to perform Horusec demonstration

    Go 4 1

  4. Threat-Hunting Threat-Hunting Public

    The purpose of these documents, it was to execute several efficiency and detection tests in some endpoint solutions, this document brings the result of the defensive security analysis with an offen…

    16 7

  5. identity-threat-labs/Malware-in-PDF identity-threat-labs/Malware-in-PDF Public

    Malicious PDF files recently considered one of the most dangerous threats to the system security. The flexible code-bearing vector of the PDF format enables to attacker to carry out malicious code …

    5

  6. identity-threat-labs/Uncovering-Attack-Path identity-threat-labs/Uncovering-Attack-Path Public

    Understanding attack paths is paramount for developing effective cybersecurity strategies. By dissecting potential routes, organizations can implement targeted security measures. These may include …

    4