Skip to content
View ere6u5's full-sized avatar
🪬
sudo make me a sandwich
🪬
sudo make me a sandwich

Block or report ere6u5

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
ere6u5/README.md

root@ere6u5:~$ whoami

EXECUTE COMMAND — SHOW OUTPUT

================================[ USER INFO ]================================

================================[ ABOUT ME ]================================

[ User: ere6u5 ]
[ Status: Learning | Growing | Hacking | Resting ]

[ Specialization: Security Overlord | Pentest God | Reverse Engineering Wizard ]

[ Mission: Understand how everything works → then break it properly ]
[ Motto: "Why have root when you can be root?" ]

[ Languages: Golang | C/C++ | Python | Kotlin | JavaScript | Bash ]
[ Shells: zsh | bash | Python ]
[ Editor: vim > everything else ]

root@ere6u5:~$ activity report --hats

EXECUTE COMMAND — SHOW OUTPUT

purple hat

EXECUTE COMMAND — SHOW OUTPUT

2+ years deep in application security battlefield. Transforming vulnerabilities into features and building security that doesn't slow down development. Specializing in making security sexy and automated.

"When security becomes a bottleneck, you're doing it wrong."

TECHNICAL SKILLS

Security Domain Technologies & Tools Proficiency
SAST/DAST Semgrep, CodeQL, SonarQube, OWASP ZAP ⭐⭐⭐⭐⭐
API Security Postman, Burp Suite, OWASP API Top 10 ⭐⭐⭐⭐⭐
CI/CD Security GitHub Actions, Jenkins, GitLab CI ⭐⭐⭐⭐⭐
Secure Architecture Threat Modeling, SDLC Integration ⭐⭐⭐⭐
Code Review Manual + Automated Audit Techniques ⭐⭐⭐⭐⭐
DevSecOps Pipeline Security, Automated Testing ⭐⭐⭐⭐

SHOWCASE PROJECTS

OWASP Research Suite

OWASP API OWASP Web

Deep dive into OWASP Top 10 vulnerabilities with practical examples and mitigation strategies

Security Testing Tools

Juice Shop SAST Linter Audit

Advanced SAST analysis and security linter configuration for enterprise-grade code auditing

CI/CD Security Pipeline

Nyx Pipeline

Architected full security integration into SDLC:

  • Test Stage: Automated SAST/DAST scanning
  • Build Stage: Security-hardened container builds
  • Deploy Stage: Security validation and compliance checks

blue hat

EXECUTE COMMAND — SHOW OUTPUT

2+ years on the frontlines of Security Operations. Hardening perimeters, automating defenses, and hunting threats. Specializing in building resilient security infrastructures that just work.

"Defense is not a state, it's a continuous process."

TECHNICAL SKILLS

Security Domain Technologies & Tools Proficiency
Firewall Administration Check Point, Fortigate, PT AF, Threat Prevention ⭐⭐⭐⭐⭐
VPN & Cryptography ViPNet, Континент, S-Terra, КриптоПро, GOST ⭐⭐⭐⭐⭐
DDoS Mitigation Mitigator, Гарда, Provider Coordination ⭐⭐⭐⭐⭐
Email Security Fortimail, Anti-Spam, Anti-Phishing, SEG ⭐⭐⭐⭐
SIEM & Monitoring Event Analysis, Incident Response, Shift Work ⭐⭐⭐⭐⭐
Infrastructure & Virtualization VMware, VirtualBox, Linux (Bash), Windows Server ⭐⭐⭐⭐

KEY ACHIEVEMENTS

SOC Automation & Tooling

Scripted solutions for mass network device configuration via SSH (Python), slashing deployment times and eliminating human error in critical security changes.

Complex Incident Management

Led mitigation efforts for large-scale DDoS attacks, coordinating with providers and manually managing blacklists to maintain service availability for clients.

Infrastructure Hardening

Administered a full stack of defensive systems (Firewalls, VPN, HSMs, Mail Gateways), ensuring policy optimization, threat prevention, and cryptographic compliance across hybrid environments.

Security as a Service

Delivered expert security outsourcing for multiple clients, from daily monitoring and backup management to in-depth analysis and consultation on secure service configuration.


red hat

green hat

work


root@ere6u5:~$ github --analytics

EXECUTE COMMAND — SHOW OUTPUT


root@ere6u5:~$ certs --show

EXECUTE COMMAND — SHOW OUTPUT

work


root@ere6u5:~$ contact --info

EXECUTE COMMAND — SHOW OUTPUT

DIGITAL PRESENCE & NETWORKS

Platform Badge Description
GitHub GitHub Main code repository and projects
GitLab GitLab Alternative projects and CI/CD
Telegram Telegram Fast communication and chats
Telegram Channel Telegram Channel Write-ups, solutions, and infosec insights
HH.ru HH.ru Professional resume and experience

COMMUNITY & REACH

Visitors GitHub Followers GitHub Stars


Pinned Loading

  1. ctf-writeups ctf-writeups Public

    Go

  2. juice-shop-dast-analysis juice-shop-dast-analysis Public

    HTML

  3. juice-shop-sast-analysis juice-shop-sast-analysis Public

    Shell

  4. nyx nyx Public

    Go

  5. owasp-top10-api-vulnerabilities owasp-top10-api-vulnerabilities Public

    Python

  6. owasp-top10-vulnerabilities owasp-top10-vulnerabilities Public