Skip to content
View itsVentie's full-sized avatar
🌙
Oh my moons...
🌙
Oh my moons...

Organizations

@TheFueki

Block or report itsVentie

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
itsVentie/README.md

𖤓 Ventie Ravelle 𖤓

Security Engineer / Full-stack / DFIR


⌈ Identity ⌋

  • Type: INFJ-A (The Advocate)
  • Enneagram: 4w5 (The Free Spirit)
  • Temperament: Melancholic-Choleric
  • Philosophy: Digital Sovereignty / Privacy / Comfort
  • Chess Elo: 2300+
  • Shogi: 5 Kyu

⌈ Technical Arsenal ⌋

Low-Level & System Engineering

  • Go: High-concurrency patterns, Goroutines optimization, net/http, CGO, Custom Tooling.
  • C++/C: Memory management, STL, Pointer arithmetic, Socket programming, WinAPI/POSIX.
  • C#: .NET Internals, Asynchronous programming, Entity Framework, WinForms/WPF for tooling.
  • Rust: Memory safety principles, Ownership model, Cargo ecosystem (Learning phase).

stack icons

Security & Offensive Operations

  • Vulnerability Research: Memory corruption, Logic flaws, OWASP Top 10, Proof-of-Concept (PoC) development.
  • Red Teaming: Active Directory attacks, Privilege escalation, Persistence mechanisms, EDR Evasion.
  • OSINT: Network reconnaissance, Metadata analysis, Automated data harvesting (Custom Go/Py scripts).
  • Applied Cryptography: ECC (Ed25519), Symmetric (AES-GCM, ChaCha20), Hashing (Argon2, SHA-3), PKI.

Digital Forensics & Incident Response (DFIR)

  • Analysis: Memory forensics, Artifact recovery, Log parsing (ELK/SIEM), File system analysis (NTFS/Ext4).
  • Networking: Deep Packet Inspection (DPI), Wireshark, Scapy, TLS Decryption, Traffic analysis.
  • Reversing: Static/Dynamic analysis, Disassemblers (Ghidra/IDA), Debuggers (x64dbg/GDB).

Infrastructure & Cloud

  • OS Hardening: Linux kernel tuning (sysctl), AppArmor/SELinux profiles, Windows GPO hardening.
  • Virtualization: Docker (Containerization), Kubernetes (Orchestration), Helm, K8s Security Policies.
  • Web Servers: Nginx (Reverse Proxy, Load Balancing, Hardening), Apache.
  • CI/CD & DevOps: GitHub Actions, Gitlab CI, Infrastructure as Code (Basic Terraform).

Web & Backend Architecture

  • Languages: TypeScript, Node.js (Runtime), Python (FastAPI/Flask).
  • Protocols: gRPC (Protobuf), WebSockets (Real-time sync), RESTful APIs, GraphQL.
  • Databases: PostgreSQL (Relational/Optimization), Redis (In-memory/Pub-Sub), Supabase (BaaS).
  • Frontend: React, Next.js (SSR/ISR), Tailwind CSS, Zustand (State Management), Vite.

stack icons


⌈ Expertise & Focus ⌋

  • System Architecture: Designing high-performance, concurrent systems.
  • Security Research: OSINT, network reconnaissance, and software development.
  • Database Management: PostgreSQL (Deep-level), Redis (Caching/Streams), Supabase, Neon, FireBase.
  • Desktop Engines: Wails, Tauri.
  • Optimization: Algorithm engineering and performance bottlenecks elimination.

⌈ Communication ⌋

  • Languages: Russian (Native), Ukrainian (C2), English (C1), French (B1), Spanish (A2)
  • Location: France, Europe
  • Timezone:
    • Winter: CET (UTC+1)
    • Summer: CEST (UTC+2)
  • Status: Available for remote projects and security audits.

⌈ Contact ⌋


EOF

Pinned Loading

  1. akiraedc akiraedc Public

    Python

  2. Inkspire Inkspire Public

    Go

  3. TheFueki/Liora TheFueki/Liora Public

    TypeScript 1

  4. TheFueki/MarsGo TheFueki/MarsGo Public

    Go

  5. TheFueki/ChessView TheFueki/ChessView Public

    Python

  6. TrustMe TrustMe Public

    I am not a Virus!Just trust me.

    C++ 2