Skip to content
View Leobatman's full-sized avatar

Block or report Leobatman

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Leobatman/README.md

Typing SVG

🔥 Threat Profile

Status: ACTIVE | Clearance: CLASSIFIED | Affiliation: RED TEAM

Current Operation: B.S. Computer Engineering @ São Judas University Specialization: Offensive Security, DFIR, Network Penetration Testing Mission: Identify security gaps, exploit vulnerabilities, and strengthen digital defenses through ethical hacking methodologies.


🎓 VALIDATED CREDENTIALS


Cybersecurity Operations

Linux Fundamentals

Network Security

Security Principles

In Progress

In Progress

⚔️ Offensive Security Arsenal

🔴 Exploitation & Penetration Testing

🔴 Forensics & Incident Response

🔴 Infrastructure & Development


💻 Technical Skills Matrix


📊 OPERATIONAL METRICS

GitHub Activity Graph


📊 Threat Intelligence Dashboard

Category Tools & Technologies Proficiency
Reconnaissance Nmap, Shodan, Maltego, theHarvester 🔴🔴🔴🔴⚪
Vulnerability Assessment Nessus, OpenVAS, Nikto 🔴🔴🔴⚪⚪
Exploitation Metasploit, Burp Suite, SQLmap 🔴🔴🔴🔴⚪
Post-Exploitation Mimikatz, PowerShell Empire, Cobalt Strike 🔴🔴🔴⚪⚪
Forensics Wireshark, Autopsy, FTK Imager, Volatility 🔴🔴🔴🔴⚪
Scripting Python, Bash, PowerShell 🔴🔴🔴🔴⚪

🌐 CONNECT WITH OPERATIONS

🚀 Current Operations & Objectives

  • 🎯 Active Mission: Developing advanced penetration testing labs and exploit development research
  • 📚 Research Focus: Active Directory attack vectors, privilege escalation techniques, and APT simulations
  • 🔬 Testing Environment: Home lab with multiple VLANs, vulnerable VMs, and honeypots
  • 🎓 Academic Focus: Computer Engineering with emphasis on cybersecurity and network architecture

"In cybersecurity, the only way to defend is to think like an attacker."

Pinned Loading

  1. Deathstar-CTF-Security-Analysis Deathstar-CTF-Security-Analysis Public

    Relatório técnico e walkthrough do laboratório Deathstar (CTF) explorando vulnerabilidades web e sistema Linux.

    1

  2. Scarlet-ghost Scarlet-ghost Public

    Scarlet Ghost automatiza a instalação de 50+ ferramentas de segurança ofensiva em Linux, macOS e WSL com um único comando. Detecta o SO, gerencia backups, logs e relatórios. Pronto para Red Team. D…

    Shell 1 1

  3. Cyberghost-OSINT Cyberghost-OSINT Public

    O CyberGhost OSINT v5.0 é uma plataforma de reconhecimento tático desenvolvida para automatizar a coleta de inteligência e o mapeamento de superfícies de ataque. Ao contrário de ferramentas de busc…

    Shell 2 3

  4. SCRIPTS-BASH SCRIPTS-BASH Public

    Script profissional de análise forense de logs focado em Cybersecurity, capaz de detectar ataques (SQLi, XSS, LFI, RCE), gerar relatórios executivos e preservar evidências digitais.

    Shell 1

  5. Forca-bruta Forca-bruta Public

    VULCAN é uma ferramenta profissional de testes de segurança que realiza brute force avançado em hashes e serviços de rede, com suporte a múltiplos algoritmos, geração de wordlists, ataques distribu…

    Python 1

  6. Carreira-Cybersecurity Carreira-Cybersecurity Public