Skip to content
View DevGreick's full-sized avatar
🏠
Working from home
🏠
Working from home

Highlights

  • Pro

Block or report DevGreick

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
devgreick/README.md
  Profile views
  Typing SVG
 

    Automação para prever movimentos e Red Team para executá-los.  

Automação  •  Threat Intel  •  Pentesting

  Status Profissional

[+] FEED DE AMEAÇAS AO VIVO: CISA - Vulnerabilidades Exploradas Conhecidas 👇 (clique para abrir)

Vulnerabilidades exploradas conhecidas da CISA • atualizado 21/12/2025 14:11 UTC • exibindo 10 itens

Fonte: CISA Known Exploited Vulnerabilities

  • CVE-2025-14733 - WatchGuard Firebox Out of Bounds Write Vulnerability
    Fornecedor: WatchGuard | Produto: Firebox | Adicionado: 2025-12-19
    WatchGuard Fireware OS iked process contains an out of bounds write vulnerability in the OS iked process. This vulnerability may allow a remote unauthenticated attacker to execute arbitrary code and affects both the mobile user VPN with IKEv2 and the branch office VPN using IKEv2 when configured with a dynamic gateway peer.
    Ação requerida: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

  • CVE-2025-59374 - ASUS Live Update Embedded Malicious Code Vulnerability
    Fornecedor: ASUS | Produto: Live Update | Adicionado: 2025-12-17
    ASUS Live Update contains an embedded malicious code vulnerability client were distributed with unauthorized modifications introduced through a supply chain compromise. The modified builds could cause devices meeting specific targeting conditions to perform unintended actions. The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.
    Ação requerida: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

  • CVE-2025-40602 - SonicWall SMA1000 Missing Authorization Vulnerability
    Fornecedor: SonicWall | Produto: SMA1000 appliance | Adicionado: 2025-12-17
    SonicWall SMA1000 contains a missing authorization vulnerability that could allow for privilege escalation appliance management console (AMC) of affected devices.
    Ação requerida: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable

  • CVE-2025-20393 - Cisco Multiple Products Improper Input Validation Vulnerability
    Fornecedor: Cisco | Produto: Multiple Products | Adicionado: 2025-12-17
    Cisco Secure Email Gateway, Secure Email, AsyncOS Software, and Web Manager appliances contains an improper input validation vulnerability that allows threat actors to execute arbitrary commands with root privileges on the underlying operating system of an affected appliance.
    Ação requerida: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

  • CVE-2025-59718 - Fortinet Multiple Products Improper Verification of Cryptographic Signature Vulnerability
    Fornecedor: Fortinet | Produto: Multiple Products | Adicionado: 2025-12-16
    Fortinet FortiOS, FortiSwitchMaster, FortiProxy, and FortiWeb contain an improper verification of cryptographic signature vulnerability that may allow an unauthenticated attacker to bypass the FortiCloud SSO login authentication via a crafted SAML message. Please be aware that CVE-2025-59719 pertains to the same problem and is mentioned in the same vendor advisory. Ensure to apply all patches mentioned in the advisory.
    Ação requerida: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

  • CVE-2025-14611 - Gladinet CentreStack and Triofox Hard Coded Cryptographic Vulnerability
    Fornecedor: Gladinet | Produto: CentreStack and Triofox | Adicionado: 2025-12-15
    Gladinet CentreStack and TrioFox contain a hardcoded cryptographic keys vulnerability for their implementation of the AES cryptoscheme. This vulnerability degrades security for public exposed endpoints that may make use of it and may offer arbitrary local file inclusion when provided a specially crafted request without authentication.
    Ação requerida: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

  • CVE-2025-43529 - Apple Multiple Products Use-After-Free WebKit Vulnerability
    Fornecedor: Apple | Produto: Multiple Products | Adicionado: 2025-12-15
    Apple iOS, iPadOS, macOS, and other Apple products contain a use-after-free vulnerability in WebKit. Processing maliciously crafted web content may lead to memory corruption. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on WebKit for HTML processing.
    Ação requerida: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

  • CVE-2018-4063 - Sierra Wireless AirLink ALEOS Unrestricted Upload of File with Dangerous Type Vulnerability
    Fornecedor: Sierra Wireless | Produto: AirLink ALEOS | Adicionado: 2025-12-12
    Sierra Wireless AirLink ALEOS contains an unrestricted upload of file with dangerous type vulnerability. A specially crafted HTTP request can upload a file, resulting in executable code being uploaded, and routable, to the webserver. An attacker can make an authenticated HTTP request to trigger this vulnerability. The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.
    Ação requerida: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

  • CVE-2025-14174 - Google Chromium Out of Bounds Memory Access Vulnerability
    Fornecedor: Google | Produto: Chromium | Adicionado: 2025-12-12
    Google Chromium contains an out of bounds memory access vulnerability in ANGLE that could allow a remote attacker to perform out of bounds memory access via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.
    Ação requerida: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

  • CVE-2025-58360 - OSGeo GeoServer Improper Restriction of XML External Entity Reference Vulnerability
    Fornecedor: OSGeo | Produto: GeoServer | Adicionado: 2025-12-11
    OSGeo GeoServer contains an improper restriction of XML external entity reference vulnerability that occurs when the application accepts XML input through a specific endpoint /geoserver/wms operation GetMap and could allow an attacker to define external entities within the XML request.
    Ação requerida: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.


[+] FEED DE INTEL: ÚLTIMOS POSTS

Fonte: feeds públicos de segurança


[+] ARSENAL: FERRAMENTAS, TECNOLOGIAS E PROJETOS

Python Bash Linux Docker
Fortigate Palo Alto Cisco ASA F5 WAF Rust
Nmap Wireshark

[+] Projetos em alta projeto destaque

⭐ ThreatDeflect

Ferramenta de análise de ameaças que automatiza a consulta de IPs/URLs em múltiplas fontes, gera relatórios e cria resumos com IA local.

💻 Portfólio Interativo

Portfólio no formato de um sistema operacional, com terminal web, comandos, easter eggs e assistente com RAG.


Troféus do GitHub

GitHub Stats de devgreick Linguagens mais usadas

Snake animation

[+] CONTATO

LinkedIn Portfólio



Apoie meu trabalho
Buy Me a Coffee

Pinned Loading

  1. ThreatDeflect ThreatDeflect Public

    Uma ferramenta de análise de ameaças que automatiza a consulta de IPs/URLs em múltiplas fontes (VirusTotal, Shodan, etc.), gera relatórios e cria resumos com IA local.

    Python 46 2