- 🔭 I’m currently working as ... a Cyber Threat Intelligence Analyst
- 🌱 I’m currently learning about ... Threat Intelligence Lifecycle!
- 👯 I’m looking to collaborate with ... AI developers.
- 🤔 I’m looking for help with ... integrating AI to create a cybersecurity product.
- 💬 Ask me about ... Anything related to cybersecurity
- 📫 How to reach me at: ... Twitter: th3hack3rwiz
- 😄 Pronouns: ... He/Him
- ⚡ Fun fact: ... I once survived a hailstorm in the middle of a leafy jungle.
Welcome!
A CTI analyst here, who has knowledge in pentesting, bug bounty hunting, and who loves scripting tools to contribute to the cybersecurity community.
Pinned Loading
-
Lazy-FuzzZ
Lazy-FuzzZ PublicSometimes we want to fuzz a set of sub-domain URLs with a common wordlist. Fuzzing them one by one is a tedious task, not to mention the false positives we obtain in those results. To solve this pr…
-
Wordlist-Weaver
Wordlist-Weaver PublicThe project aims at creating target-specific wordlists for any web application that you are testing.
-
Scantime-Crypter
Scantime-Crypter PublicThe project aims at building a Scan-Time Crypter that can assist a malware in bypassing antivirus software. The Crypter will open the malware from the disk while creating another output file to the…
-
Phish-Me-Not
Phish-Me-Not PublicThis project aims at training/educating employees about real-life phishing attack scenarios by carrying out simulated spear-phishing attacks.
-
Something went wrong, please refresh the page to try again.
If the problem persists, check the GitHub status page or contact support.
If the problem persists, check the GitHub status page or contact support.