-
Notifications
You must be signed in to change notification settings - Fork 47
/
Copy pathparams.json
6 lines (6 loc) · 5.31 KB
/
params.json
1
2
3
4
5
6
{
"name": "About me",
"tagline": "About me",
"body": "\r\n### whoami\r\n--\r\n\r\n```\r\nwhoIsBl4de() {\r\n [\r\n $$BugBounty$$ Hunter, \r\n CTF{flag_seeker}, \r\n coder.createCode([JavaScript,Python,PHP,Bash,C,Java]), \r\n h4cK3R, \r\n https://web.developer\r\n ].random()\r\n}\r\n```\r\nHello and welcome to my GitHub account.\r\nIf you'd like to know more about me, this is likely the best place to start :)\r\n\r\n--\r\n\r\n### Research\r\n\r\n#### Hidden directories and files as a source of sensitive information about web application\r\n\r\nSome analysis about how to get information about web application from folders like _.git_ , _.idea_ and similar.\r\nhttps://github.com/bl4de/research/tree/master/hidden_directories_leaks\r\n\r\nAs a part of this, I'm working on tool (in Python) to extract data from revealed Git repositories:\r\n\r\nhttps://github.com/bl4de/security-tools/tree/master/diggit\r\n\r\n#### RAA Ransomware JavaScript code analysis\r\n\r\nDetailed, step-by-step analysis of RAA ransomware, created entirely in JavaScript\r\n\r\nhttps://github.com/bl4de/research/tree/master/raa-ransomware-analysis\r\n\r\n--\r\n\r\n### Bug Bounty\r\n\r\n**Bugcrowd**\t\t \r\n\r\nhttps://bugcrowd.com/bl4de\r\n\r\n**HackerOne**\t\t \r\n\r\nhttps://hackerone.com/bl4de\r\n\r\n**OpenBugBounty**\r\n\r\nhttps://www.openbugbounty.org/researchers/_bl4de/\r\n\r\n--\r\n\r\n### Hall of Fame\r\n\r\n**OLX** https://security.olx.com/security-hall-of-fame.html\r\n\r\n\r\n### Acknowledgments\r\n\r\n**Eternity Wall** https://eternitywall.it/m/5ac86b8099d0121ff3b1944309878eb7d1d37341b062ec4a7219957fb5776365\r\n\r\n--\r\n\r\n### CTF\r\n\r\n**CTFtime.org**\t\t \r\n\r\n#### 2015\r\n\r\nFinished overall rating place: 562 with 14,677 pts in 2015.\r\nTeams with points: 7275, best team result: 1789,884 (Plaid Parliament of Pwning)\r\n\r\nIn 2015 I've finished in **top 8%** teams in CTFtime ranking with any points (more than 7800 teams in total), with **0,81% points of the best team** :)\r\nI was as good as almost 1% of Plaid Parliament of Pwning! :)\r\n\r\nFull stats: https://ctftime.org/team/12769 (bl4de - not active at this name anymore)\r\n\r\n#### 2016\r\n\r\n(in progress...)\r\n\r\nFull stats: https://ctftime.org/team/16701 (Stack)\r\n\r\n#### CTF writeups\r\n\r\nYou can see my **CTF writeups** from variuos events here: https://github.com/bl4de/ctf#ctf-capture-the-flag-writeups-repository\r\n\r\n--\r\n\r\n### Me online\r\n\r\nYou can follow me on **Twitter**. I share IT security, web development and coding related stuff.\r\n\r\nhttps://twitter.com/_bl4de\r\n\r\n\r\n#### Other sites\r\n\r\n**Project Euler**\r\n\r\n![Project Euler badge]\r\n(https://projecteuler.net/profile/bl4de.png)\r\n\r\n--\r\n\r\n### [PL only]\r\n\r\nJeśli nie jest Ci obcy język polski ;-), to poza powyższymi miejscami możesz także zajrzeć na strony portalu **sekurak.pl**, gdzie znajdziesz trochę moich tekstów.\r\nMożesz je odszukać podając w wyszukiwarce mój nickname (bl4de) lub po prostu kliknąć ten link:\r\n\r\nhttp://sekurak.pl/?s=bl4de\r\n\r\n--\r\n\r\n### About me\r\n\r\nA few words about myself :)\r\n\r\nI am Full Stack Web Application developer since October 2007 (professional career, but I have started to write code in Basic on my Commodore 16 when I was 15, in 1992 :) ). After 8-bit era (Commodore 16, 64 and 128) and 16-bit era (Amiga 1200) in 2000 finally I've got my first 32-bit PC machine with Pentium processor and 32 MB RAM. Then in 2002 I've finished my IT Associate Degree and started to learn everything else by myself. From time to time.\r\nUnfortunately for me, I was able to start my professional IT career when I was 30 years old, in 2007. Now, I've got web development experience (both server and client) with several technology stacks including LAMP (Linux/Apache/MySQL/PHP) Node.js/server-side JavaScript applications, JavaEE enterprise applications (some basic experience, I am not Java developer).\r\n\r\nSo, Linux/UNIX machines, Bash, PHP, JavaScript, HTML5, Python, SQL, database engines, web servers, Node, Single Page Applications, AJAX, REST, SOAP/WSDL, Angular, Git, SVN, MongoDB, JSON, EcmaScript 6, Babel, Promises, closures, Public/Protected/Private, constructors, interfaces, imports, includes, Require, modules, components - and many, many, many other words - I know them all :) Even more - I know what they mean and even how to use them! :D\r\n\r\nDuring all of those years I had a feeling that IT Security is something I'd like to do most. So I've started to improve my knowledge in fields like web applications security, network security, penetration testing.\r\nIn 2015 I've started to attend as many CTFs as possible, to do IT security related research, to develop tools for IT security world and to do all this stuff what some guys call 'hacking' ;) \r\n\r\nSince June 2016 I've also started to participate in couple of bug bounty programs on Bugcrowd and HackerOne.\r\nIn July 2016 I was able to send my first couple of bugs finding reports both on HackerOne and BugCrowd and on 1st of August 2016 I've received my first \"Hall of Fame\" entry and first approved bugs. But that was just the beginning.\r\n\r\nToday, I'm going to continue my career as successful inedpendent penetration tester, security researcher and bug bounty hunter.\r\n\r\n--\r\n\r\n",
"note": "Don't delete this file! It's used internally to help with page regeneration."
}