Skip to content
View R00tendo's full-sized avatar
Block or Report

Block or report R00tendo

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
R00tendo/README.md

Hello! I'm a cyber security enthusiast and software developer from Finland.

I know a thing or two from almost every area of tech, but my main focus is on offensive cyber security, specifically web penetration testing and mobile penetration testing and software development with Golang.



Individual technologies:

Rating system (color coded so it's easier to read):

  • Can use basic functionality perfectly = ✅

  • Advanced/Fluent =

  • Intermediate =

  • Beginner =




Fluent

  • Python:

Python was the second language I learnt and I have actively used it from 2018 to 2023, and still use it now and then.

  • Go:

Go is nowadays my go to language and I have actively used it from the beginning of 2023 to now.

  • Javascript:

I have used JS here and there for the longest time, but only got around to properly learning it around 2023-24. I mainly use JS with React and Express.js.

Not fluent, but can use properly

  • Java (2024)

  • PHP (2024)





Methologies:

  • Agile:

  • DevSecOps:

Operating Systems (system administration and usage):

  • Linux:

  • Windows:

Virtualization software:

  • Docker:

  • Proxmox:
  • ESXI/VCenter/VSphere:

Databases:

  • SQL:

  • NOSQL:

Front and backend web:

  • Golang:
    • Fiber:
    • Wails (desktop apps using webview):
  • Javascript:
    • React:

    • ExpressJS:

  • HTML:

  • CSS:

  • SASS:
  • NGINX:
  • Apache web server:
  • Spring framework:

  • Web Apps:

  • Mobile:
  • Radio (RFID, NFC, Sub-GHz):
  • Network: or
  • WIFI:
  • Active Directory:
  • IOT:

Other related:

  • OSINT:
  • Reverse engineering (PE/ELF):



OPSEC (Operational Security):

SIEM/XDR:

  • WAZUH:
  • ELK Stack:

IDS:

  • SNORT:

Vulnerability management:

  • OpenVAS: ✅
  • Nessus: ✅

Hardening:

  • Linux:
  • Active Directory:
  • Windows:


Other related:

  • Digital Forensics:

Miscellaneous

Contact Email:R00tendo@proton.me

Tech articles: https://medium.com/@R00tendo



TryHackMe


Feel free donate Monero: 48ZrWwcf1gpG9VCe7agYru36SJhKwDDyGCgGw4TvkAG92Exd9pN7GBvL23SkwrMMbgdFa7BnFX2k6cD49SzV7pv42B4JDQE

Popular repositories Loading

  1. dnsnet dnsnet Public

    backdoor that uses dns to communicate

    Python 32 2

  2. ssb ssb Public

    ssb=simple subdomain bruteforcer

    Python 17 3

  3. awacs-scanner awacs-scanner Public

    Another vulnerability scanner

    Python 17 4

  4. GoDLLInjector GoDLLInjector Public

    A simple DLL injector written in Golang

    Go 8 3

  5. wiz_exploit wiz_exploit Public

    Python 5

  6. jaeles-custom-signatures jaeles-custom-signatures Public

    4 1