Skip to content
View Runaque's full-sized avatar
💭
No time to talk! Eating cookies...
💭
No time to talk! Eating cookies...

Highlights

  • Pro

Block or report Runaque

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Runaque/README.md

🛡️ Runaque | Security Architecture & Governance

I am a security passionist with a proven track record in Defense-in-Depth architecture, incident response, and GRC (Governance, Risk, and Compliance). My experience centers on building highly resilient, layered defense systems—a methodology I even scale to my personal network, utilizing dual firewalls and secure DMZ principles.

My work focuses on understanding and mitigating risk, leveraging experience in both offensive and defensive security practices to build more robust systems.

🛠️ Core Competencies & Technologies

Security Architecture: Layered Defense, Network Segmentation (VLANs/ACLs), Zero Trust Principles, and secure configuration management.

Offensive Security Research: Ethical Red-Teaming, Social Engineering Analysis, Physical Penetration Tactics (for defensive mitigation development).

Governance & Policy: Vulnerability Management, Incident Response Planning, and regulatory compliance adherence.

Infrastructure: Unraid OS, Docker, PowerShell (Currently expanding expertise), Linux Administration, and private LLM inference via custom hardware (i7-7700, dual NVIDIA GPUs).

💻 Portfolio Spotlight: Hardware Attack Surface Testing

The scripts found in my public repositories, such as those related to BadUSB payloads, are framed around Hardware Attack Surface Testing in a fun educational way.

These projects are designed for ethical analysis and educational purposes to understand how physical access vulnerabilities can be mitigated, not exploited. They demonstrate proficiency in:

Endpoint Security Policy Bypass: Developing proofs-of-concept to test the effectiveness of existing EDR and USB device controls.

Payload Development: Demonstrating competence in developing system-level commands using scripting languages for audit purposes.

📝 Some of my Writeups

My LinkedIn Writeups

📫 Connect with Me

My LinkedIn Profile

Pinned Loading

  1. Hash_Calculator Hash_Calculator Public

    Just a small app I made to calculate MD5, SHA1, SHA256, and SHA512 hashes in an easy (and hopefully) understandable GUI.

    Python

  2. Wi-Fi_QR_Code-Generator Wi-Fi_QR_Code-Generator Public

    Wi-Fi QR Code Generator

    Python 1

  3. WindowsProductKeyViewer WindowsProductKeyViewer Public

    Extract in a simple and hassle free way your Windows Product Key and save it into a .txt file.

    Python

  4. eml_Viewer eml_Viewer Public

    Simple app to read eml files.

    Python

  5. Simple_User_Adder Simple_User_Adder Public

    Add extra users to your SOHO or home network with a couple of clicks.

    Python