Skip to content
View nm3s1s's full-sized avatar

Block or report nm3s1s

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
nm3s1s/README.md

Typing SVG


🎯 Sobre mí

class CybersecurityStudent:
    def __init__(self):
        self.name = "Tomás"
        self.role = "Estudiante ASIR & Pentester en formación"
        self.location = "España 🇪🇸"
        self.interests = ["Pentesting", "CTFs", "Red Team", "Bug Bounty"]
        
    def current_focus(self):
        return {
            "learning": ["Web Application Security", "Active Directory", "Binary Exploitation"],
            "certifications": ["CPTS (HTB)", "eJPTv2 (INE)", "CEH (EC-Council)", "OSCP (Offensive Security)"],
            "practicing": ["HackTheBox", "TryHackMe", "VulnHub", "PortSwigger Academy"]
        }

🛠️ Arsenal de Herramientas

🔴 Reconocimiento & Enumeración

Nmap Masscan Amass FFuF Gobuster DNSRecon

🎯 Explotación & Post-Explotación

Metasploit SQLMap Hydra John Hashcat Impacket

🌐 Web Application Security

Burp Suite OWASP ZAP Nikto WPScan

🔍 Análisis & Forense

Wireshark Volatility Autopsy

💻 Lenguajes & Scripting

Python Bash PowerShell JavaScript

🐧 Sistemas Operativos

Kali Linux Parrot OS Ubuntu Windows


📊 Estadísticas de GitHub

GitHub Stats

GitHub Streak

Top Langs


🎓 Certificaciones en Progreso


Certified Penetration Testing Specialist

eLearnSecurity Junior Penetration Tester v2

Certified Ethical Hacker

Offensive Security Certified Professional

💡 Enfoque Actual

┌──(nm3s1s㉿kali)-[~]
└─$ cat current_objectives.txt

📚 Estudiando:
  ├─ Active Directory Attacks
  ├─ Web Application Exploitation (OWASP Top 10)
  ├─ Buffer Overflow & Binary Exploitation
  └─ Red Team Tactics & Procedures

🎯 Practicando en:
  ├─ HackTheBox (Machines & Challenges)
  ├─ TryHackMe (Learning Paths)
  ├─ PortSwigger Academy (Web Security)
  ├─ PentesterLab (Hands-on Labs)
  └─ CTF Competitions

🔨 Proyectos:
  ├─ Desarrollo de scripts de automatización
  ├─ Documentación de write-ups
  └─ Creación de laboratorios personales

🏆 Logros & Plataformas

HackTheBox TryHackMe PortSwigger


📫 Conecta Conmigo

LinkedIn Twitter GitHub Email


💭 Quote


"Try Harder" 🔥 | Hack The Planet 🌍


Popular repositories Loading

  1. nmapparser nmapparser Public

    Herramienta profesional para analizar y extraer información relevante de escaneos Nmap

    Python 1

  2. nm3s1s nm3s1s Public

  3. nm3s1s.github.io nm3s1s.github.io Public

    Pentesting & CTF Tracker by @nm3s1s

    HTML