jayme dos santos paulo
jaymepsantos
·
AI & ML interests
President's Cup CISA, Machine Learning, Computational Vision, Robots, Deep Learning, Natural Language Processing (NLP)
Lazarus Group, Fancy Bear / APT28 / Pawn Storm / Strontium, Equation Group, Cozy Bear / APT29 / Nobelium / The Dukes
OWASP, Capture The Flag (CTF), ESP32, Arduino, Raspberry Pi
Reverse Engineering Tools, Reverse Engineering Software/Hardware, Reverse Engineering Techniques for Mobile App Pen Testing,Reverse Engineering Android Mobile, Reverse Engineering iPhone Mobile.
Wi-Fi Pineapple, USB Rubber Ducky, Flipper Zero, Proxmark3, HackRF One, UART, SWD, SPI, I2C
Codebreaker Challenge, Information Security, Hacking, Penetration Testing (Pentests), Windows Vulnerabilities, Android Vulnerabilities, iPhone Vulnerabilities
Defense Advanced Research Projects Agency (DARPA), AI Cyber Challenge (AIxCC), DEF CON® Hacking, Government Communications Headquarters (GCHQ). Certified Ethical Hacker (CEH)
Offensive Security Certified Professional (OSCP)
CompTIA Security+
Certified Information Systems Security Professional (CISSP)
GIAC Penetration Tester (GPEN). Ethical Hacking
Vulnerability Assessment
Risk Management
Network Security
2. Cloud Security
AWS Security
Azure Security
Google Cloud Security
Cloud Penetration Testing
Identity and Access Management (IAM)
3. Advanced Hacking Techniques
Exploit Development
Buffer Overflow Attacks
Web Application Hacking
SQL Injection
Cross-Site Scripting (XSS)
Cross-Site Request Forgery (CSRF)
Social Engineering
4. Forensics and Incident Response
Digital Forensics
Malware Analysis
Incident Response
Data Recovery
5. Security Tools and Frameworks
Kali Linux, Parrot OS, BlackArch
Metasploit, Burp Suite, Nmap, Wireshark
Nessus, OpenVAS
Snort, Suricata (IDS/IPS)
Nikto, OWASP ZAP
Hydra, John the Ripper, Aircrack-ng
6. Cryptography
Public Key Infrastructure (PKI)
Symmetric and Asymmetric Encryption
RSA, AES, SHA, MD5
Blockchain and Cryptocurrencies Security
Secure Communications and VPN
7. IoT Security
IoT Penetration Testing
Bluetooth Hacking
RFID/NFC Security
Smart Home Devices Vulnerabilities
8. Automated Security Testing
Continuous Integration/Continuous Deployment (CI/CD) Security
Static and Dynamic Analysis Tools (SAST/DAST)
Automated Penetration Testing Tools
9. Artificial Intelligence and Machine Learning in Security
AI for Threat Detection
Machine Learning for Intrusion Detection
Anomaly Detection in Networks
AI-driven Malware Analysis
10. Advanced Threats and APTs
Threat Intelligence
Nation-State Threat Actors
Advanced Persistent Threats (APTs) Analysis
Zero-Day Exploits
11. Legal and Ethical Hacking
Understanding of laws and regulations such as GDPR, HIPAA, and CCPA
Compliance with security standards like ISO 27001, NIST, PCI-DSS
Bug Bounty Programs and Responsible Disclosure
12. Programming and Scripting Skills
Python, Bash, PowerShell for automation and exploit development
Reverse Engineering with C, C++, Assembly, and Ghidra
Web Development for Security Testing (HTML, CSS, JavaScript, PHP, SQL)
Mobile App Development for Security (Android/iOS)
13. Cybersecurity Competitions
Capture The Flag (CTF) Competitions
Hackathons
Bug Bounty Programs
Cybersecurity Challenges (e.g., Hack the Box, TryHackMe)
14. Security in Emerging Technologies
Security for 5G Networks. Programming Languages
Linux:
Proficient in Linux system administration and security.
Shell scripting, bash, and automation on Linux.
Tools and utilities for pentesting on Linux, such as Netcat, Nmap, and TCPdump.
JavaScript:
Front-end and back-end development with Node.js.
Handling RESTful APIs.
Security in JavaScript, such as preventing XSS and CSRF.
Frameworks like React, Angular, Vue.js (for front-end security).
Python:
Automation of pentesting and hacking tasks.
Developing custom security tools (scripts, exploits, traffic analysis).
Popular libraries such as Scapy, Requests, BeautifulSoup, Paramiko, Cryptography.
Using Python in Machine Learning and Data Science for security (traffic analysis, anomaly detection).
C / C++:
Low-level programming and exploit development.
Creating hacking tools in C (e.g., buffer overflow exploits).
Analyzing and debugging C/C++ code.
Understanding vulnerabilities in these languages, such as memory issues (buffer overflow, etc.).
Java:
Developing secure applications in Java.
Security testing for Android applications (Java/Kotlin).
Penetration testing and reverse engineering of Java applications.
Frameworks like Spring Security for web applications.
2. Other Related Topics
Secure Web Development:
Security techniques for protecting web applications in JavaScript, Python (Flask/Django), and Java (Spring).
Implementing security on both front-end and back-end.
DevOps and Automation:
Integrating security into the development lifecycle (DevSecOps).
Automation tools like Ansible, Docker, and Kubernetes for secure environments. Selenium
Web automation tool for testing web applications and automating repetitive tasks in browsers.
2. PyAutoGUI
A tool for automating GUI interactions, allowing you to control the mouse and keyboard to automate tasks on your desktop.
3. Automate the Boring Stuff with Python (Library)
A collection of Python modules for automating common computer tasks, such as working with files, emails, and web scraping.
4. Celery
Distributed task queue for managing background tasks and asynchronous job execution in Python applications.
5. Fabric
A tool for automating SSH-based deployment and system administration tasks.
6. Airflow
Open-source workflow automation and scheduling system for managing complex data pipelines.
7. Ansible (Python API)
Ansible is a popular automation tool, and the Python API allows integration for configuration management, deployment, and orchestration.
8. Scrapy
A web crawling and web scraping framework to automate the extraction of data from websites.
9. Requests
A simple HTTP library for automating HTTP requests in Python. It simplifies sending requests to web APIs and interacting with web services.
10. BeautifulSoup
A Python library for parsing HTML and XML documents and automating web scraping tasks.
11. Pywinauto
A set of Python modules for automating GUI-based applications on Windows, allowing interaction with desktop applications.
12. Jupyter Notebooks
An open-source web application for creating and sharing documents that contain live code, equations, visualizations, and narrative text for automation purposes.
13. Tweepy
A Python library for automating interactions with the Twitter API (tweets, followers, etc.).
14. Paramiko
A Python library for automating SSH connections and securely executing remote commands on servers.
15. pandas
A powerful library for data manipulation and analysis, widely used for automating data processing tasks.
16. pytest
A framework for writing simple and scalable test cases, automating software testing.
17. Twilio
A service for automating communications like SMS, voice calls, and other messaging services via the Twilio API.
18. Robot Framework
A generic open-source automation framework for acceptance testing and robotic process automation (RPA).
19. OpenCV (for Computer Vision Automation)
A powerful library used to automate tasks involving image processing and computer vision, such as face detection, object recognition, and video analysis.
20. Boto3 (for AWS Automation)
The Amazon Web Services (AWS) SDK for Python, which helps automate tasks related to managing AWS resources.
Autonomous Vehicles Security
Quantum Computing and its Impact on Cryptography
Drone Hacking
15. Networking and Protocols
TCP/IP, HTTP, DNS, SSL/TLS
Network Penetration Testing
VPN and Proxy Technologies
Network Traffic Analysis, SB Rubber Ducky
A USB device that emulates a keyboard and can be programmed to execute predefined commands on a target computer.
2. Wi-Fi Pineapple
A penetration testing device used for Wi-Fi network auditing and man-in-the-middle attacks. It is designed to easily capture and analyze Wi-Fi traffic.
3. Flipper Zero
A portable multi-tool for pentesters and hardware hackers, capable of interacting with various digital protocols like RFID, NFC, Bluetooth, IR, and more.
4. Proxmark3
A powerful RFID tool for reading, writing, and cloning RFID tags. It can also perform advanced attacks like relay attacks and EMV hacking.
5. HackRF One
A software-defined radio (SDR) that enables users to transmit and receive radio signals from 1 MHz to 6 GHz. It is used for signal analysis, wireless communication hacking, and testing.
6. JTAGulator
A tool used for identifying JTAG (Joint Test Action Group) pins on circuit boards to aid in reverse engineering and debugging embedded systems.
7. Bus Pirate
A universal bus interface tool that can communicate with various protocols, including I2C, SPI, UART, and others. It is used for hacking and analyzing embedded systems.
8. Arduino
A versatile open-source electronics platform used for building and hacking devices. It allows for easy interfacing with sensors, motors, and other hardware components.
9. Raspberry Pi
A low-cost, credit-card-sized computer that can be used for various hacking projects, penetration testing, and running different security tools. It’s often used in hardware hacking and IoT (Internet of Things) experimentation.
10. Teensy
A small USB development board similar to Arduino, but more powerful. It can be used for USB and hardware hacking projects, including custom devices and attacks.
11. OsmocomBB
A project that allows you to interface with GSM mobile phones for hardware hacking and mobile network penetration testing. It’s an open-source mobile software platform.
12. ChipWhisperer
A tool used for side-channel analysis and fault injection attacks. It’s commonly used to break encryption and other security systems at the hardware level.
13. Logic Analyzers
Devices used for capturing and analyzing digital signals from embedded systems and microcontrollers. Popular tools include Saleae Logic Analyzers and other similar products for debugging and reverse engineering.
14. OpenOCD (Open On-Chip Debugger)
A software tool used for programming and debugging embedded systems through interfaces like JTAG, SWD, and other protocols.
15. Flipper Zero
A portable multi-tool for pentesters and hardware hackers, capable of interacting with various digital protocols like RFID, NFC, Bluetooth, IR, and more.
16. Bus Pirate
A tool for interacting with different communication protocols like I2C, SPI, and UART, often used for reverse engineering embedded devices and testing hardware components.
17. Metasploit Hardware Module
Metasploit is commonly used for software hacking, but it also has modules that allow hardware interaction for attacks such as through USB and network-based devices.
18. Software-Defined Radio (SDR)
SDRs, such as the HackRF One, are powerful tools for capturing, transmitting, and analyzing radio frequencies across a wide spectrum, commonly used in signal hacking, wireless communication analysis, and radio surveillance., nsa,gchq, cia, mosad.
Recent Activity
liked
a Space
2 days ago
multimodalart/stable-video-diffusion
liked
a Space
5 days ago
jamesliu1217/EasyControl_Ghibli
liked
a Space
about 1 month ago
prithivMLmods/Callisto-OCR3-2B
Organizations
None yet
models
None public yet
datasets
None public yet