8000 kal1gh0st (Francesco Fedele) · GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content
View kal1gh0st's full-sized avatar
:atom:
Working finally in the office
:atom:
Working finally in the office

Block or report kal1gh0st

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
kal1gh0st/README.md

Hi there 👋

It's a me, Kal1gh0st! 👋

Everyday, I get to create awesome experiences and engage with the vibrant GitHub developer community. Find me all around the web:

Tech Stack 💻 💼 I use

git gitlab slack trello ssh putty Octocat

Francesco Fedele:computer:

visitors

github-contribution-grid-snake

IMG_20210418_123156__01 (2)

Contact me 🖐️

Francesco Fedele

Fra Twitter

Fra LinkedIN Fra Reddit

Some Fun Facts about me:

GitHub Stats

If you haven't had a chance to check out GitHub Skyline yet, do it now. It's a 3D visualisation of your contribution graph. You can view the graphic, make a video, download the STL file, and even view it in Virtual Reality. You can also view the ASCII file and if you know the code combination, you can view the Konami code (コナミコマンド).

https://themitigators.com/wp-content/uploads/2018/11/tenor.gif

Experience

Systems:

  • helpdesk, networking

Network equipment:

  • Azure, AWS Cloud, Docker, Vcenter, Splunk, Sonarqube (codereviewer), AD, Fortinet, Cisco ASA, Sophos, WatchGuard, PfSense, Opnsense, Elasticsearch.

azure amazonwebservices kubernetes docker jira

Systems:

  • excellent knowledge and experience in systems with any OS, 24-hour team shift worker

Monitoring:

  • installation, configuration, updating and management of monitoring programs, such as: AlienVault, Observium, Zabbix.

Firewall:

  • Firewall installation, configuration, update and management (nextgen) for the security perimeter, such as: Fortinet, Sophos, Cisco and PFSense.

Firewall maintenance:

  • configuration, restore, backup, restore, update, Vlan creation, VPN, NAT / PAT / NAT-PAT, physical connections for perimeter security with Fortinet, Cisco, HP, Zyxel, Sophos.

Vulnerability Assessment and Penetration Testing:

  • Use of the main suites (for pentesting) Parrots OS, Kali-Linux and use of the main tools such as nmap, metasploit, burpsuite, hydra, netcat, ophcrack, hashcat, aircrack-ng, kismet, cherrytree, dirb, openssl, sslchecker, sslstrip, megescan, dnsenum, masscan, nikto, OWASP zap, openvas, nessus, acunetix on infrastructure perimeters, web application and mobile app (on site and remotely).

  • Creation of documentation and reporting relating to Vulnerability Assessment and Penetration test activities.

  • Knowledge of DBMS environments such as ORACLE, MySQL, SQL Server, MariaDB, AWS, Azure.-Technical Assistance: Advice and technical support Helpdesk for private customers and companies

Courses and certifications

E-Learning Digital Connect

  • Ethical hacker and security manager

Fortinet

  • NSE1, NSE2, NSE3

Cisco Networking Academy

  • Introduction to IT security and ISDN1-2-3

E-LearnSecurity

  • EJPT (Junior Penetration Tester)

Tenable University

  • Nessus Tenable certification

ISCI (International cybersecurity institute)

  • Certify cybersecurity

Skills

Languages: English, Spanish

Ability to use simpler and less scientific language to explain topics to users.

Good self-management skills, aptitude for optimizing work process cycles and excellent teamwork skills.

Microsoft packages: Word, Excel, Access and PowerPoint.

windows8

Platform-Community: CircleCI, SourceTree, DigitalOcean, Confluence

circleci sourcetree digitalocean confluence

Editor & Repo: Atom, VisialStudio, VCode, Vim, Bitbucket

atom visualstudio vscode vim bitbucket

Web Server: Ngnix, Apache

nginx apache tomcat

Programming languages: Advanced C, C++, C#, go, Swift, YAML, XML, Java, SQL, Python, Perl, Ruby, Lua, Bash.

c cplusplus go gcc swift java mysql mongodb postgresql python perl ruby lua bash

Scripting languages: Npm, Awk, Java-Script, CSharp, Php, AWS.

npm php javascript csharp amazonwebservices

Markup languages: HTML, CSS.

html5 css3

Operating systems: Windows, Linux, UNIX, FreeBSD, IOS, Android, Arduino

windows8 linux unix centos redhat ubuntu debian android arduino

Pinned Loading

  1. AutoBlue AutoBlue Public

    This is some no-bs public exploit code that generates valid shellcode for the eternal blue exploit and scripts out the event listener with the metasploit multi-handler.

    Python 7 2

  2. OSINT OSINT Public

    Collections of Tools, Bookmarks, and other guides created to aid in OSINT collection

    Python 17

  3. CVE-2021-3156 CVE-2021-3156 Public

    Description Sudo before 1.9.5p2 has a Heap-based Buffer Overflow, allowing privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character.

    Python 3 1

  4. dirtycow dirtycow Public

    Forked from firefart/dirtycow

    Dirty Cow is a silly name, but it's a serious Linux kernel problem. According to the Red Hat bug report, "a race condition was found in the way the Linux kernel's memory subsystem handled the copy-…

    C 1

  5. CVE-2021-1675-LPE CVE-2021-1675-LPE Public

    Forked from hlldz/CVE-2021-1675-LPE

    Local Privilege Escalation Edition for CVE-2021-1675

    C

  6. CVE-2021-21985_PoC CVE-2021-21985_PoC Public

    Forked from alt3kx/CVE-2021-21985_PoC

    The vSphere Client (HTML5) contains a remote code execution vulnerability due to lack of input validation in the Virtual SAN Health Check plug-in which is enabled by default in vCenter Server.

    Lua

0