Skip to content
View GZimbra's full-sized avatar
🧏
Ascending
🧏
Ascending

Block or report GZimbra

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Gzimbra/README.md
terminal typing
+------------------------------------------------------------------+
| ZIMBRA :: PUBLIC OPERATOR DOSSIER                                |
+------------------------------------------------------------------+
| Handle      : Gabriel M. Zimbra                                  |
| Status      : Active / Learning / Escalating                     |
| Location    : Brazil / UTC-3                                     |
| Focus       : Offensive Security, TCP/IP, Linux, Automation      |
| Stack       : C#, Python, Bash, SQL, Linux, Docker, Git          |
| Labs        : TryHackMe, CTFs, recon tooling, packet analysis    |
+------------------------------------------------------------------+

root@zimbra:~# whoami

Software Engineering student focused on offensive security, computer networks and low-level systems. I build socket-based applications, automation scripts, recon tooling and lab-grade security projects to understand systems from protocol to execution.

operator:
  name: "Gabriel M. Zimbra"
  alias: "Zimbra"
  role: "Software Engineering Student"
  focus:
    - Offensive Security
    - Computer Networks / TCP-IP
    - Linux Infrastructure
    - Automation
  languages: [ "C#", "Python", "Bash", "SQL" ]
  tools: [ "Nmap", "Wireshark", "Metasploit", "Hydra", "Gobuster", "John the Ripper" ]
  directive: "Know the protocol. Own the stack. Leave clean logs."

root@zimbra:~# ls /usr/local/bin/arsenal

C#          :: TCP sockets, client/server architecture, typed systems
Python      :: automation, recon pipelines, packet tooling, ML experiments
Bash        :: Linux workflows, scripting, enumeration chains
SQL         :: data querying, schemas, persistence
Linux       :: primary environment, process/network inspection
Docker/Git  :: reproducible environments and versioned workflow

root@zimbra:~# nmap -sV /active_operations

Operation Stack Domain Status
TCP_Chess_Node C# / TCP Sockets Multiplayer networking ONLINE
Hangman_C/S C# / TCP Sockets Protocol design ONLINE
Sec-Automaton Python / Bash Recon automation ACTIVE
NetSniffer Python / Scapy Packet analysis UPGRADING
Neural-Core Python / PyTorch Deep learning TRAINING
22/tcp    open  tcp-sockets      custom C# client/server labs
80/tcp    open  recon-pipeline   enumeration and reporting automation
443/tcp   open  packet-layer     capture, parsing and protocol analysis
4444/tcp  open  lab-channel      offensive security practice environment
9999/tcp  open  research-node    AI and systems experiments

root@zimbra:~# ./fetch_stats --target=github


root@zimbra:~# netstat -an | grep ESTABLISHED

   
+ [OK] Broadcast online.
+ [OK] Stack loaded.
+ [OK] Trace scrubbed.
! [SYS] End of transmission.

Pinned Loading

  1. Campo_Minado Campo_Minado Public

    Campo minado feito em C#

    C#

  2. caronasaqui caronasaqui Public

    Projetos de Caronas para Estudantes

    JavaScript

  3. malware-simulation-python malware-simulation-python Public

    Python

  4. PriceOps PriceOps Public

    Simulador de Pricing em HTML, CSS e JavaScript

    JavaScript

  5. Projeto-Pricing Projeto-Pricing Public

    CLI em Python para precificação financeira com 3 módulos: **Opções** (Black-Scholes, Greeks, vol. implícita), **Bonds** (preço, duration, YTM) e **DCF** (valuation, tabela WACC × g). Navegação por …

    Python

  6. voice-ai-assistant voice-ai-assistant Public

    Local Python voice assistant with Whisper, PyTorch intent classification, and offline technical responses for coding, networking, and cybersecurity.

    Python