Skip to content
View jon-brandy's full-sized avatar
🧬
Psalms 91:1-16
🧬
Psalms 91:1-16
  • PT ITSEC Asia Tbk
  • Jakarta, Indonesia
  • LinkedIn in/nicsap

Organizations

@ImaginaryCTF @TCP1P @csc-research-development @baycysec @PETIRsec

Block or report jon-brandy

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 250 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
jon-brandy/README.md

Hi there πŸ‘‹

πŸ”’ DFIR Consultant | Defensive Content Engineer | Black Hat Asia & USA 2025 Arsenal Speaker

I am a fresh graduate in Cybersecurity with a strong passion for Digital Forensics & Incident Response (DFIR), Malware Analysis, and Binary Exploitation. As an active member of the international CTF teams ImaginaryCTF, I contribute to challenge development and consistently engage in solving problems in the PWN and Forensics categories.

Beyond competitions, I regularly create both offensive and defensive cybersecurity content engineering practical scenarios, tools, and educational materials. I’m eager to continue growing in the field and secure a cybersecurity role where I can make a meaningful impact in defending digital infrastructure.

πŸ“œ Certifications:

  • EC Council - Computer Hacking Forensic Invesigator (CHFIv11).
  • eLearn Certified Digital Forensics Professional (eCDFPv2).
  • EC Council - Certified Incident Handler (ECIHv3).
  • EC Council - Digital Forensics Professional (DFEv1).
  • Certified Mobile Penetration Tester - Android (CMPen).
  • Certified Cloud Security Practitioner AWS (CCSP-AWS).
  • Certified Network Security Practitioner (CNSP).
  • Certified Appsec Practitioner (CAP).

🎯 FYI:

I absolutely enjoy writing HackTheBox writeups on machines, Sherlocks, and solving PWN CTF challenges. You can find some of my work on my Repo, where I share my solutions and knowledge.

Pinned Loading

  1. hackthebox hackthebox Public

    My WriteUps for HackTheBox CTFs, Machines, and Sherlocks.

    Python 141 25

  2. baycysec/plaguards baycysec/plaguards Public

    Plaguards: Open Source PowerShell Deobfuscation and IOC Detection Engine for Blue Teams. [Presented at Black Hat Asia and USA 2025 Arsenal]

    Python 16 4

  3. HolmesGeo HolmesGeo Public

    A simple, modular tool for extracting and analyzing IP addresses from multiple sources.

    Python 1 1

  4. baycysec/sigurd baycysec/sigurd Public

    Sigurd is a research-oriented malware sample, specifically a Remote Access Trojan (RAT), used to support digital forensics, incident response training, and CTF-style forensic challenges.