Skip to content
View filipi86's full-sized avatar
👽
Hacking is NOT a crime
👽
Hacking is NOT a crime
Block or Report

Block or report filipi86

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
filipi86/README.md

Profile Views

🇧🇷 I've been working as a Threat and Security Researcher and CyberSecurity Advocate. 🇧🇷

Snake animation

Skill & Languages & Tools 🛠

CyberSecurity  RedTeam  Security  ThreatHunting  MalwareAnalysis  BlueTeam  SecurityResearches  AppSec  Python  Shell  PowerShell  Docker  Git  GitHub  GitHub Actions  CircleCI  MySQL  Visual Studio Code  Linux  MacOS  Markdown 

Analytics ⚙️

Github Languages

Github Statistics

Github Contributions

Let's connect? 🤝

Projects ⚙️

Pinned

  1. MalwareAnalysis-in-PDF MalwareAnalysis-in-PDF Public

    Malicious PDF files recently considered one of the most dangerous threats to the system security. The flexible code-bearing vector of the PDF format enables to attacker to carry out malicious code …

    185 23

  2. ConnectBoxDOCSIS-3.0 ConnectBoxDOCSIS-3.0 Public

    The Connect Box is the worldwide most compact EuroDOCSIS 3.0 Voice Gateway which provides the ideal all-in-one wired and wireless solution, designed for your home, home office, or small business/en…

    9 1

  3. Threat-Hunting Threat-Hunting Public

    The purpose of these documents, it was to execute several efficiency and detection tests in some endpoint solutions, this document brings the result of the defensive security analysis with an offen…

    15 5

  4. Awesome-Hacking Awesome-Hacking Public

    Forked from wh0isdxk/Awesome-Hacking

    A collection of various awesome lists for hackers, pentesters and security researchers

    7 2

  5. CrowdStrike CrowdStrike Public

    The purpose of this document, it was to execute several efficiency and detection tests in our lab environment protected with an endpoint solution, provided by CrowdStrike, this document brings the …

    6 2

  6. horusec-demo horusec-demo Public

    Some examples to perform Horusec demonstration

    Go 4 1