#!/usr/bin/env python3
class SecurityResearcher:
def __init__(self):
self.name = "Tyr3ll"
self.role = "Security Tool Developer"
self.location = "Bangkok, Thailand"
self.education = "Digital Technology Innovation @ Kasem Bundit University"
self.languages = ["Python", "TypeScript", "JavaScript"]
self.interests = ["Vulnerability Research", "Automation", "Web Security"]
def get_current_focus(self):
return [
"Building vulnerability scanning tools",
"Security header analysis automation",
"Browser extensions for recon",
"Reverse engineering workflows"
]
def life_motto(self):
return "Break things ethically, build tools obsessively"
me = SecurityResearcher()View Project Details
Comprehensive command center for managing Nuclei vulnerability scans with centralized controls, scan operations, and vulnerability management dashboard.
OWASP-compliant security header analyzer that scans and reports on web application security headers for compliance and best practices.
Firefox extension for security researchers to scan JavaScript files and discover hidden endpoints during web application reconnaissance.
SAFESPACE Enterprise Edition - Generate reverse shell payloads for various platforms and languages during authorized penetration testing.
+----------------------------------+----------------------------------------+
| Focus Area | Learning |
+----------------------------------+----------------------------------------+
| Advanced Web Security | Buffer Overflows, Memory Corruption |
| Security Automation | CI/CD Security Pipelines |
| Vulnerability Research | Fuzzing Techniques |
| Tool Development | Building Scalable Security Tools |
+----------------------------------+----------------------------------------+
Building tools to make security testing more efficient, one repo at a time.
