Skip to content
View d4rks1d33's full-sized avatar

Block or report d4rks1d33

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
d4rks1d33/README.md

👋 About Me

I am a cybersecurity professional with 7 years of experience dedicated to learning, practicing, and continuously improving in the field of information security.

Since the beginning of my career, I have focused on offensive security and penetration testing, working across a wide range of environments and technologies. My experience spans from traditional on-premise infrastructures to modern cloud-based environments, always with a strong emphasis on real-world attack scenarios and risk mitigation.

🛡️ Areas of Expertise

  • Penetration Testing

    • On-premise infrastructures

    • Cloud environments

  • Operating Systems

    • Windows

    • Linux

    • MacOS

  • Application Security

    • Web applications

    • RESTful APIs

  • Mobile applications

    • Android

    • iOS

  • Security Assessments

    • Vulnerability identification and exploitation

    • Security misconfiguration analysis

    • Threat modeling and attack surface analysis

Technologies I Work With

Python HTML5 CSS3 Nim C C# C++ Java Swift

Activity Overview

GitHub Stats Top Langs

Pinned Loading

  1. ai-exploits ai-exploits Public

    Forked from protectai/ai-exploits

    A collection of real world AI/ML exploits for responsibly disclosed vulnerabilities

    Python 1

  2. QEMUAppleSilicon QEMUAppleSilicon Public

    Forked from ChefKissInc/Inferno

    Apple Silicon devices emulated on QEMU, currently only iPhone 11.

    C

  3. Moto-G82-Kali-Nethunter-Custom-Kernel Moto-G82-Kali-Nethunter-Custom-Kernel Public

    WIP Custom kernel for Moto G82

    C 3

  4. Pentest-Tools Pentest-Tools Public

    Forked from S3cur3Th1sSh1t/Pentest-Tools

    4

  5. Gemini-Flipper Gemini-Flipper Public

    Flipper Zero application to interact with Gemini-esp32 and have an AI on your Flipper

    C 65 7

  6. Flipper-Zero---RollJam-PoC Flipper-Zero---RollJam-PoC Public

    A WIP PoC for using Flipper Zero as RollJam Attack

    C 5 1