Skip to content
View m0erbye's full-sized avatar

Highlights

  • Pro

Block or report m0erbye

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
m0erbye/README.md

Hello, I'm Max

I am a dedicated penetration tester with 2 years of hands-on experience in vulnerability assessment and web application security testing, specializing in OWASP Top 10 methodologies and bug bounty hunting.

Objective

My journey in cybersecurity has led me to develop expertise in penetration testing and vulnerability research. I am passionate about identifying security flaws and helping organizations strengthen their security posture through comprehensive security assessments and responsible disclosure.

Skills

Skill Associated Project/Experience
Web Application Penetration Testing Bug Bounty Programs
Vulnerability Assessment and Reporting CVE Discovery & Disclosure
Network Security Analysis TCP/IP Protocol Analysis
Security Automation and Scripting Custom Python/Bash Scripts

Tools

Penetration Testing

Network & Reconnaissance

Programming & Scripting

Operating Systems

Security Frameworks & Standards

  • OWASP Top 10 - Web Application Security Testing
  • NIST Cybersecurity Framework 2.0 - Risk Management
  • COBIT 2019 - IT Governance and Management

Achievements

  • πŸ” Discovered and reported critical vulnerabilities through bug bounty programs
  • πŸ›‘οΈ Identified SQL Injection, XSS, and IDOR vulnerabilities in production systems
  • πŸ“‹ Contributed to CVE database through responsible disclosure
  • 🎯 Developed custom scripts to enhance vulnerability detection efficiency

Current Focus

  • πŸ”’ Advancing penetration testing methodologies and ethical hacking techniques
  • 🌐 Expanding expertise in network security and VPN configurations
  • πŸ“š Preparing for advanced cybersecurity certifications

Popular repositories Loading

  1. custom-nuclei-templates custom-nuclei-templates Public

    Custom nuclei templates with stealth attack vectors

    1

  2. m0erbye m0erbye Public

  3. moerecon moerecon Public

    Enhanced Reconnaissance Scanner

    Shell

  4. pentest-oneliners pentest-oneliners Public

    Pentest automation oneliners for reconnaissance, enumeration and exploitation

    Shell

  5. moescan moescan Public

    Advanced Reconnaissance Framework for bug bounty and pentesting

    Shell