Skip to content
View bhideki's full-sized avatar
😾
😾

Highlights

  • Pro

Block or report bhideki

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
bhideki/README.md

Penetration Tester · Red Team Operator

Typing SVG


About

Penetration Tester & Red Team Operator with experience in offensive security assessments across corporate environments. Focused on web application testing, Active Directory attacks, cloud security, and threat intelligence.

Currently working with: Pentest · Red Team Operations · Vulnerability Assessment · OSINT · Threat Intel


Toolkit

Kali Burp Suite Metasploit Nmap Python BloodHound Wireshark AWS


Certifications

Badge Certification Issuer Year
🔴 Certified Red Team Analyst (CRTA) CyberWarfare Labs 2025
☁️ Certified Multi-Cloud Red Team Analyst (MCRTA) CyberWarfare Labs 2025
🧪 eLearnSecurity Junior Penetration Tester (eJPTv2) INE Security 2025
☁️ INE Certified Cloud Associate (ICCA) INE Security 2025
🔐 Solyd Certified Pentester (SYCP) Solyd Offensive Security 2025
🛡️ Network Defense Cisco Networking Academy 2025

Stats

Visitor Count


"The quieter you become, the more you are able to hear."

Pinned Loading

  1. runtime_crypter runtime_crypter Public

    Runtime Crypter AMSI Bypass in Python

    Python

  2. coruna coruna Public

    Local hosting setup for the Coruna iOS WebKit exploit chain: staged JS loaders, F00DBEEF payload layout (manifest.json, bootstrap.dylib), loader hardening, and manifest sizes synced to on-disk byte…

    JavaScript 8 9

  3. enumeration-git-hash enumeration-git-hash Public

    Git Hash Enumerator

    Python

  4. darksword darksword Public

    Python CLI framework to serve and sync the DarkSword iOS exploit-chain payloads (iOS 18.4–18.7).

    JavaScript 56 30

  5. simple-trojan simple-trojan Public

    Simple trojan in python

    Python

  6. Lottie-Was-Builder Lottie-Was-Builder Public

    Sticker Exploit Whatsapp

    JavaScript 1 1