Skip to content
View mbeds's full-sized avatar

Block or report mbeds

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please donโ€™t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this userโ€™s behavior. Learn more about reporting abuse.

Report abuse
mBeds/README.md

๐Ÿ‰ Matthew Beddoes | The Red Dragon

"The Black Dragon was the shadow of the Red Dragon."

I am an offensive cybersecurity specialist and former blackhat turned independent auditor. For over a decade, my work exposing the vulnerabilities of global systems has been featured by the BBC, Reuters, LBC, and Foreign Policy.

Today, I use that "shadow" experience to solve discreet, complex problems for private clients and provide raw, unbiased truth for those who cannot afford to be compromised.


๐Ÿ›ก๏ธ Independent Audit & Intelligence

I operate UK Cybersecurity Testing, a strictly independent consultancy. My stance is simple: I only test. I find the gaps that "certified experts" and automated scanners miss.

  • Media Consultant: Featured expert for BBC Radio 2 and Reuters.
  • Property Intelligence: Developing custom OSINT tools for property developers to identify off-market opportunities and perform deep-dive competitor analysis using Python and Neo4j.
  • Discreet Problem Solving: High-level OPSEC, personal digital footprint removal, and private intelligence for directors.

๐Ÿš€ The Lab: AI, Robotics & Secure Systems

I donโ€™t just find holes; I build the tools of the future. Currently pursuing Computer Science at Wolverhampton University to evolve my understanding of AI and complex systems.

  • Text2Drone: Bridging natural language processing with drone automation.
  • Text2OSINT: Simplifying Open-Source Intelligence through AI-powered tools.
  • Secure Messenger: Building the next generation of private, encrypted communication tools.
  • Graph-Based RAG: Combining Java, Neo4j, and LLMs for advanced business automation and intelligence.

๐Ÿ› ๏ธ Technical Arsenal

  • Languages: Python, JavaScript, Java.
  • Specialties: Offensive Security, OPSEC, OSINT, SDR (Software-Defined Radio).
  • Crypto: Consultancy and development for secure exchanges, escrow bots, and private transactions.
  • Intelligence: Darknet OSINT and supply chain threat monitoring.

๐Ÿ’ฌ Ask Me About

  • Offensive security and the "Red Dragon" methodology.
  • AI-driven automation and robotics.
  • OSINT for property development and competitive intelligence.
  • Building secure, private-by-design systems.

๐Ÿ“ซ Secure Communication


๐Ÿ˜„ Fun Fact

My pronouns are encrypted and digitally secured.

Pinned Loading

  1. Bitcoin-Escrow-Bot Bitcoin-Escrow-Bot Public

    Bitcoin Escrow bot for Telegram

    Python