Skip to content
View Azkrath's full-sized avatar

Block or report Azkrath

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Azkrath/README.md

Hey! Azkrath here

This is my Github profile (Work in progress 🚧):

  • 🔒 Currently a professional Penetration Tester & Application Security Engineer with experience in offensive security.
  • 💻 Focused on Cyber Security and Application Security. Continuously learning about Offensive Security, Red Teaming and Security Research.
  • 💬 Ask me anything related to technology! With a deep background in software development, cybersecurity, penetration testing, and offensive security, I’m happy to share insights.
  • ✍️ I used to write about Cybersecurity on Medium, check out some of my posts!
  • 🌱 Also learning Japanese 🇯🇵 as I explore Japanese culture and language in my free time.

🔗  Connect with me

✨  About Me

I’m an IT professional with nearly 20 years of experience across IT roles, including Software Engineering, Cybersecurity and Penetration Testing. My background spans roles from IT Technician and Technical Support to Software Engineer, Tech Lead and Cybersecurity Specialist. With a strong foundation in security and development, I’m currently exploring new challenges and opportunities within the software engineering, cybersecurity and application security areas.

🏆 Cyber Security related achievements

  • CTF Organization at FCCN: As part of my team, I co-organized two Capture the Flag competitions — (Defending the SOC and Jornadas 2021) — each attracting over 800 participants. I contributed to exercise development across several categories including Web, Pwn, OSINT, Forensics, Crypto, Network, Misc, and Mission, and was responsible for implementing and supporting the competition’s infrastructure.
  • eJPT Certification: I earned the eLearnSecurity Junior Penetration Tester (eJPT) certification, showcasing my penetration testing skills. View Certification.
  • MCRTP Certification: I achieved the Multi-Cloud Red Team Practitioner certification from CyberWarfare Labs in the end of 2024, allowing me to enhance my understanding of cloud security, vulnerability assessments, and penetration testing across multiple cloud platforms, including AWS, Azure, and Google Cloud.
  • PNPT Certification: I achieved the TCM Security Practical Network Penetration Tester (PNPT) certification, further validating my expertise in network security. View Certification.
  • Published Contributor: Co-authored an article on the cybersecurity risks associated with internet-exposed webcams for Portugal’s tech magazine Exame Informática (Issue Nº327).
  • Presentations at Hardsecure: In 2022, I delivered two presentations on cutting-edge topics: “The Usage of AI in Cybersecurity” and “The Importance of Cyber Threat Intelligence,” sparking discussion on the latest industry insights.
  • TryHackMe Red Team Capstone Challenge: I earned 1st place for my write-up submission and 2nd place for the fastest completion in TryHackMe’s Red Team Capstone Challenge.Read my submission.
  • Learning Path Completions: I’ve completed numerous cybersecurity learning paths on TryHackMe, including “Complete Beginner,” “Introduction to Cyber Security,” “Pre Security,” “Web Fundamentals,” “Jr Penetration Tester,” “Offensive Pentesting,” “CompTIA Pentest+,” and “Red Teaming.”
🛠️  Some known Languages and Tools

linux windows macos bash powershell css3 html5 bootstrap javascript java dotnet python php redis express nginx nodejs flask mongodb postgresql sqlite mssql mysql git postman docker jira aws azuredevops unity

Pinned Loading

  1. waf-community-bypasses waf-community-bypasses Public

    Forked from waf-bypass-maker/waf-community-bypasses

  2. awesome-cve-poc awesome-cve-poc Public

    Forked from qazbnm456/awesome-cve-poc

    ✍️ A curated list of CVE PoCs.

  3. cve cve Public

    Forked from trickest/cve

    Gather and update all available and newest CVEs with their PoC.

    HTML

  4. POC_cves POC_cves Public

    Forked from jhftss/POC

    A public collection of POCs & Exploits for the vulnerabilities I discovered

    Objective-C

  5. Red_Team Red_Team Public

    Forked from rigyaja/Red_Team

    Some scripts useful for red team activities

    PowerShell