Skip to content
View 5ilent5pring's full-sized avatar

Block or report 5ilent5pring

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
5ilent5pring/README.md

Hi there πŸ‘‹

I'm a cyber security analyst, and focusing on below areas of studies actively:

  • Cyber Threat Intelligence (nowadays working on automation of rule generation based on IOC data)
  • Web Security (mostly SSRF and API pentesting)
  • Malware Analysis (establishing concrete background on C and Assembly, preparing for GIAC GREM)
  • OSINT/SOCMINT (continuously exercising new tools)
  • Digital Forensics and Incident Response

My work experience cover:

  • Mobile and Web application security (Burp Suite, MITM Proxy, MobSF, Frida, etc.)
    • Static Application Security Testing (SAST)
    • Dynamic Application Security Testing (DAST)
  • Network Analysis (Wireshark, Tshark)
  • Corporate Security Design and Blue Teaming (Velociraptor-Suricata-Elasticsearch triangle)
  • Web Scraping and SOCMINT (Golang and Bash scripts, some tools etc.)

My reading journey and the progress: (priority goes to CTI books...)

  • "Operationalizing Threat Intelligence", Kyle Wilhoit, Joseph Opacki β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘ 0%
  • "Cyber Threat Intelligence", Martin Lee β–ˆβ–ˆβ–ˆβ–ˆβ–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘ 20%
  • "Practical C", Steve Oualline β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘ 30%
  • "Practical Reverse Engineering", Bruce Dang, β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘ 0%
  • "Bug Bounty Bootcamp", Vickie Li, β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘ 40%
  • "Black Hat GraphQL", Nick Aleks and Dolev Farhi, β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘ 0%
  • "Hacking APIs", Corey Ball, β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ 100%
  • "Digital Forensics and Incident Response", Gerard Johansen,β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘ 0%
  • "Learning Malware Analysis", Monnappa K.A., β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘ 0%
  • "Practical Malware Analysis", Michael Sikorski and Andrew Honig, β–ˆβ–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘ 5%

Profile views

Popular repositories Loading

  1. go-noob go-noob Public template

    Basic golang scripts for beginners and everybody

    Go

  2. go-defense go-defense Public

    go scripts for blue teams

    Go

  3. crAPI crAPI Public

    Forked from OWASP/crAPI

    completely ridiculous API (crAPI)

    Java

  4. MalwareDB MalwareDB Public

    Forked from gmh5225/MalwareDB

    Repository full of malware :D

  5. Mass-Hacker-Arsenal Mass-Hacker-Arsenal Public

    Forked from EgeBalci/Mass-Hacker-Arsenal

    Massive arsenal of hacker tools...

    Shell

  6. malware-ioc malware-ioc Public

    Forked from prodaft/malware-ioc

    This repository contains indicators of compromise (IOCs) of our various investigations.

    Python