Iβm an Offensive Security Developer, with experience in Red Team, DevSecOps, and backend automation. Iβve worked as a Level 2 Security Analyst, Team Lead, and Backend/DevOps Engineer. This GitHub is where I share my side-projects and research β all for educational and security research purposes.
π Most of my repositories are private!
If you're an interviewer or recruiter and want access to more tools or source code, just reach out.
| π§ Tool | π‘ Description |
|---|---|
| Remote-Admin-Tool (Public) | Lightweight remote control tool in Go. Supports command execution, clipboard steal, layout detection. |
| Go Keylogger with work in progress reflective DLL injection (public) | Keylogger using Reflective DLL injection (Go+C). Still detectable. |
| Tor-Attack-Tools (Public) | Red Team infrastructure deployment with two containers. One Debian working as a Tor proxy and a Kali as a attacker machine. |
| HexStrike v6 AI pre-configured Docker image (Public) | A docker image to use HexStrike MCP AI server. +150 preconfigured tools. |
| JobSniper (Private) | Offensive automation for job applications. Flet GUI + Selenium bot. |
| Volunteer web development for the Dana disaster (Public) | Serverless simple website done with Hugo stored on CloudFlare. Made with love |
Proudly former global moderator of two historic Spanish-speaking hacking forums:
-
𧬠Hack x Crack β Legendary. Domain is gone but never forgotten.
Archive: HackxCrack on Archive.org
-
π¦ Underc0de.org β Still active and evolving
Profile: View on Underc0de
- Enumeration: Nmap, Google Dorks, Nslookup
- Vuln Scanning: Nikto, Burp Suite, SQLMap
- Exploitation: Metasploit, SET, Beef
- Post-Exploitation: LinPEAS, WinPEAS, Netcat
- CI/CD: GitHub Actions, Jenkins
- Infra: Terraform, Docker, AWS, IBM Cloud
- Scripting: Python, Bash, Go, PowerShell
- UFW, IP Tables, Wireshark
- Azure Sentinel, Cortex XDR, Imperva WAF, IBM QRadar
- Process injection, Windows API, memory manipulation
- EDR evasion, hooking, hardware access
- Creative obfuscation in Golang (runtime map generation)
- Researching 0-click vectors & covert channels




