Skip to content
View joaovarelas's full-sized avatar

Organizations

@xSTF

Block or report joaovarelas

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
joaovarelas/README.md

πŸš€ About Me

  • 🌍 Based in Portugal
  • πŸ’Ό Cybersecurity Professional
  • 🏞️ Mountain biking, hiking, traveling, reading about advanced hacking techniques

πŸ› οΈ Skills

  • Languages: Python, C/C++, Java, Rust
  • Technical Skills: Red Teaming, Penetration Testing, Vulnerability Assessments, Application Security, Reverse Engineering, Network Security, Virtualization, DevSecOps, Cloud, Security Architecture & Implementation
  • Soft Skills: Report Writing, Presentations, Teamwork, Critical Thinking, Problem-solving
  • Frameworks & Standards: OWASP Projects, MITRE Frameworks, NIST CSF & SP's, ISO/IEC 27000, CISv8

πŸ“ˆ GitHub Stats

GitHub Stats

🌟 Projects

Here are some highlights of my projects:

  • Security Toolkit - An open-source catalog of security tools found in public sources & repos.
  • Rust Obfuscator LLVM - Research and Docker image for adapting LLVM obfuscation techniques for Rust projects.
  • Steal Token Rust - A tool for manipulating Windows security tokens using Rust.
  • Compromised Hosts Scanner - Monitors and alerts on compromised systems using open-source intelligence sources and feeds.
  • Counter-Strike Game Engine Hacking - Developed cheat tools for Counter-Strike by reverse engineering game engine modules.
  • NetExec - Contributed a module for enumerating Hyper-V servers and VM's to this pentesting tool.

πŸ† Certifications

  • Certified Red Team Operator (CRTO)
  • Offensive Security Certified Professional (OSCP)
  • Certified Ethical Hacker (CEH)
  • Check Point Certified Pentesting Expert (CCPE)
  • CompTIA Security+ (S+)
  • Microsoft Certified: Azure Fundamentals (AZ-900)
  • Windows API Security Professional (WASP)

βœ‰οΈ Get in Touch

Feel free to reach out if you're interested in collaboration or just want to chat about cybersecurity! 😊


Thanks for visiting my profile! πŸš€

(Generated by GPT)

Pinned Loading

  1. Obfuscator-LLVM-16.0 Obfuscator-LLVM-16.0 Public

    Shell 103 17

  2. java-remote-class-loader java-remote-class-loader Public

    Java 31 7

  3. CVE-2021-30357_CheckPoint_SNX_VPN_PoC CVE-2021-30357_CheckPoint_SNX_VPN_PoC Public

    Proof-of-Concept for privileged file read through CheckPoint SNX VPN Linux Client

    6 1

  4. CVE-2020-1350.py CVE-2020-1350.py
    1
    #!/usr/bin/env python3
    2
    
                  
    3
    """cve-2020-1350.py: Windows DNS Server Vulnerability"""
    4
    
                  
    5
    __author__  = "@joaovarelas"
  5. steal-token-rs steal-token-rs Public

    "steal-token-rs" is a Rust project that demonstrates how to obtain and impersonate a user's access token, allowing manipulation of system privileges.

    Rust 3 2

  6. CSGO-priv9-h00k CSGO-priv9-h00k Public

    Internal Counter-Strike: Global Offensive Hack released in 2018 (UC)

    C++ 1