Skip to content
View msegoviag's full-sized avatar
🎯
Focusing
🎯
Focusing

Block or report msegoviag

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
msegoviag/README.md

Hi 👋, I'm Miguel Segovia I love Web hacking 💻🥷 and Powerlifting training 🏋🏻

I am passionate about cybersecurity, pentesting and cross-platform development.

  • 🔭 I was a programmer but now I am working as a Professional pentester.

  • 🥷In my spare time I dedicate my time to bug bounty and vulnerability research in open source software, I have reported vulnerabilities to NASA, Google, Apache, OpenAI, Plone, OpenCms among others.

  • 🕵️ My CVEs:

    • CVE-2023-6380
    • CVE-2023-6379
    • CVE-2023-42501
    • CVE-2023-41048
    • CVE-2023-39264
    • CVE-2023-34110
    • CVE-2023-36387
    • CVE-2023-34944
    • CVE-2023-31799
    • CVE-2023-31800
    • CVE-2023-31801
    • CVE-2023-31802
    • CVE-2023-31803
    • CVE-2023-31804
    • CVE-2023-31805
    • CVE-2023-31806
    • CVE-2023-31807
  • 💬 Ask me about Cibersecurity, Python, Java, Powerlifting...

  • 📫 How to reach me: miguelsegovia21@gmail.com

Connect with me:

miguelsegoviagil

Languages and Tools:

android cplusplus flutter java linux objectivec python swift

Pinned Loading

  1. discovered-vulnerabilities discovered-vulnerabilities Public

    Vulnerabilities discovered in my spare time as a bounty hunter...

  2. GsmLocator GsmLocator Public

    Interception tool: Locates the cell tower to which the user is connected and returns the location.

    Java 2 1

  3. exifharvester exifharvester Public

    Tool for extracting EXIF metadata from website images

    Python 6 3