Skip to content
View danieleperera's full-sized avatar

Block or report danieleperera

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
danieleperera/README.md

Daniele Perera - Cypher 👔

cypher@matrix:~$ sayHi
Hi there 👋
cypher@matrix:~$ whoami
cypher
cypher@matrix:~$ cypher | more
I'm Daniele alias cypher
* Hard worker
* Python Coder
* Running, gym, pizza and sushi lover
* Infosec enthusiast driven by passion, curiosity and willingness to learn

InfoSec interests 👾

cypher@matrix:~$ cat infosec_interests
Blueteaming, Active directory/ SIEMs, Threat intelligence, Threat Hunting, OSINT and CTFs
cypher@matrix:~$ cat community
- Volunteering as a member in the [R00tMi community](https://twitter.com/R00tMi)
- core admin of [blueteamzone](https://twitter.com/blueteamzone/)
- Actively contributing to the cybersecurity community

Currently working on :octocat:

cypher@matrix:~$ cat active_pojects
* [OnionIngestor](https://github.com/danieleperera/OnionIngestor) 
* [**Confidential**](https://github.com/danieleperera/401)
* [**Confidential**](https://github.com/danieleperera/401)

📚 to read

Infosec

Finance

Author Description Resource URL
Sarah Jones A Brief History of Attribution Mistakes - analyse the mistakes made by others so that you do not repeat them securityandtechnology.org
Sergio Caltagirone, Andrew Pendergast, and Chris Betz The Diamond Model of Intrusion Analysis - A comprehensive guide that presents a structured method for analyzing cyber intrusions, emphasizing the interconnectedness of adversaries, capabilities, victims, and infrastructure in the cyber threat landscape. activeresponse.org
Blake Strom MITRE ATT&CK™: Design and Philosophy - This book provides a thorough exploration of the MITRE ATT&CK framework, revealing its design principles, philosophy, and application. mitre.org
Blake Strom MITRE ATT&CK™: Design and Philosophy - This book provides a thorough exploration of the MITRE ATT&CK framework, revealing its design principles, philosophy, and application. mitre.org

danieleperera's GitHub Stats

Most Used Languages

For more in detail information visit my Portfolio

Popular repositories Loading

  1. OnionIngestor OnionIngestor Public archive

    An extendable tool to Collect, Crawl and Monitor onion sites on tor network and index collected information on Elasticsearch

    Python 305 40

  2. SocAnalystArsenal SocAnalystArsenal Public archive

    Quick SOC L1 ticket structure

    Python 34 13

  3. clean_breach clean_breach Public

    Databreach Cleanner

    Python 2

  4. VigilantOnion VigilantOnion Public

    Forked from andreyglauzer/VigilantOnion

    :squirrel: 🐍 - CRAWLER em sites da rede tor, em busca de keywords.

    JavaScript 2

  5. GitMiner GitMiner Public

    Forked from UnkL4b/GitMiner

    Tool for advanced mining for content on Github

    Python 1

  6. LeakLooker-X LeakLooker-X Public

    Forked from FlatL1neAPT/LeakLooker-X

    LeakLooker GUI - Discover, browse and monitor database/source code leaks

    JavaScript 1