Skip to content
View sendmetirries's full-sized avatar

Block or report sendmetirries

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
sendmetirries/README.md

Hey there 👋, I'm jarso

💻 Offensive Security Engineer | hardware tech | software developer

"My other computer is your computer" 🕶️


Hacker GIF


---> 🚀 I design and develop advanced security tools, conduct ethical system testing, and specialize in identifying and mitigating vulnerabilities.

My work spans a wide range of domains, including offensive security utilities, malware analysis and reverse engineering, and open-source security projects aimed at strengthening defenses.
In addition to software-based security solutions, I explore hardware security research, focusing on embedded systems, IoT devices, and firmware integrity.
When I am not actively developing or testing, I am engaged in methodical problem analysis, applying both reverse-engineering techniques and in-depth system diagnostics to uncover and resolve complex security challenges.

🛠 Current Operations

  • Reverse engineering malware and analyzing threat actor techniques
  • Conducting advanced penetration testing for networked, web-based, and embedded systems
  • Designing and developing security-focused software solutions
  • Engineering and testing hardware prototypes for cybersecurity applications
  • Integrating software and hardware components for comprehensive security assessments

🤝 Collaborations Wanted

-- Open-source cybersecurity tools

  • Ethical hacking projects with measurable security impact
  • Advanced software engineering for secure applications
  • Hardware security research, including IoT and embedded system testing
  • Integrated solutions combining software and hardware security measures

🧠 Learning Intel

= Exploit development for modern and legacy systems

  • Threat intelligence gathering and adversary profiling
  • Secure software architecture and defensive coding practices
  • Hardware engineering for embedded devices and firmware analysis
  • Reverse engineering software binaries and physical circuitry
  • Bridging cybersecurity with hardware security for end-to-end protection

💬 Ask Me About

  • Python, React, Vue, GSAP
  • Advanced Linux system administration and secure command-line operations
  • Designing and implementing security-focused software solutions
  • Developing and testing hardware-based security tools
  • Integrating software and hardware systems for cybersecurity applications

📡 Mission Links


🛠 Tech Arsenal


📊 Stats & Analytics

GitHub Stats GitHub Streak

Top Languages


Profile Views


"In a world full of zero-days… be the patch."

Popular repositories Loading

  1. device-tracker device-tracker Public

    Dart 4

  2. windows-batch-malware-simulator windows-batch-malware-simulator Public

    WARNING: DESTRUCTIVE SCRIPT **This script is highly destructive and intended for research or educational review ONLY. Running this script will cause irreversible damage to the operating system, sto…

    3

  3. Modern-Luxury-Budgeting-TemplateS Modern-Luxury-Budgeting-TemplateS Public

    This template helps you plan, track, and visualize your personal or business budget in an elegant, easy-to-use format. It automatically calculates totals, variances, and percentages, so you can foc…

    3

  4. hashcat-cracking-queue hashcat-cracking-queue Public

    “Streamline your password cracking — queue, manage, and get notified effortlessly.”

    Python 2

  5. sendmetirries sendmetirries Public

    Crafting exploits, building tools, and occasionally teaching machines how to break things (ethically). My repositories are a mix of penetration testing utilities, security research, and experiments…

    2

  6. CONVERT-TO-BINARY CONVERT-TO-BINARY Public

    # Binary ↔ Text Converter A lightweight, accessible static web page that converts text to 8-bit binary and binary back to text. Includes a dark mode toggle, LED animation feedback, copy/download ac…

    HTML 2