Skip to content
View Schecter333's full-sized avatar

Block or report Schecter333

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Schecter333/README.md

Hi, I'm Darren

A bit about me

My journey in technology began in a weekend market where I humbly started by mopping floors and packing store rooms until I learned how to mod and repair various types of gaming consoles & computers. This was the leadup to my career in cloud solutions & cybersecurity. I'm Technology enthusiast with 12+ years of experience working in MSP & enterprise environments. I enjoy actively learning about new technologies as well as how to attack and defend them. I actively seek out challenges and opportunities to develop new skills in the security field. My current ventures have given me some exposure to physical security with lock picking as well as various "auditing tools" that I built using Raspberry PI & PI Pico devices.

Skills

Skill Associated Project/Training
Ethics in cybersecurity, historical attacks and how attacks impact businesses Foundations of Cybersecurity
Linux & SQL using CLI to query SQL databases Tools of the Trade: Linux and SQL
Network security hardening, architecture & cloud networks Connect and Protect: Networks and Network Security
Network traffic analysis , IDS, SIEM queries and investigation Sound the Alarm: Detection and Response
Asset classification , Risk analysis , threat modelling & vulnerability assessments Assets, Threats, and Vulnerabilities
Using playbooks to respond to threats, security auditing , risk management Play It Safe: Manage Security Risks
Network reconnaissance NMAP
DNS enumeration Subdomain Enumeration
Username enumeration, brute force attacks & cookie tampering Fuzz
Walking web applications Web app source inspection ,debug and network inspection using developer tools
Manipulating URLs and inspecting sites to access restricted accounts and content IDOR vulnerability exploit
Digital forensics ,Exif viewer ,metadata analysis and gathering GPS co-ordinates from image metadata Subdomain Enumeration
Creating & deploying trojans, worms & using Spytech spyware EC Council Certified Cybersecurity Technician
Man-in-the-Middle (MITM) Attack using Cain & Abel EC Council Certified Cybersecurity Technician
MAC Flooding using macof EC Council Certified Cybersecurity Technician
DoS Attack on a Target Host using hping3 EC Council Certified Cybersecurity Technician
SQL Injection Attack Against MSSQL to Extract Databases using sqlmap EC Council Certified Cybersecurity Technician
Parameter Tampering using Burp Suite EC Council Certified Cybersecurity Technician
Audit System Passwords using John-the-Ripper EC Council Certified Cybersecurity Technician
Social Engineering EC Council Certified Cybersecurity Technician
Crack a WPA2 Network using Aircrack-ng EC Council Certified Cybersecurity Technician
Hack an Android Device by Creating Binary Payloads EC Council Certified Cybersecurity Technician
Exploit Open S3 Buckets using AWS CLI EC Council Certified Cybersecurity Technician
Implement Access Controls in Windows Machine EC Council Certified Cybersecurity Technician
Manage Access Controls in Linux Machine EC Council Certified Cybersecurity Technician
Implement Role-Based Access Control in Windows Admin Center (WAC) EC Council Certified Cybersecurity Technician
Password Policies using Windows Group Policy EC Council Certified Cybersecurity Technician
Shodan,DNS Twist, DNS Dumpster MyOSINT Open Source Intelligence Gathering
Intelligence gathering , Data funnelling to process information into usable intel Recorded Future Intelligence Fundamentals
Mimecast ,Defender for 365 & Vipre mail security configuration + maintenance Email Security Solutions
Bit Defender,ESET,Defender for Endpoint AV, Heimdal deployment ,configuration, maintenance and support Antivirus Solutions
Cloud workloads migration to M365 using BitTitan Cloud Workloads Migration With BitTitan
Cloud workloads migration to M365 using AvePoint Cloud Workloads Migration With AvePoint Fly
Business workloads migration to M365 using Mover.io & Exchange admin centre migration mover.io and EXO admin migration tools
Azure IaaS & Azure Virtual Desktop design and deployment IaaS and AVD
Costing Azure solutions with the Azure cost calculator Azure cost calculator
Security awareness, ISO ,Phishing training content creating and staff training Training and upskilling
PFsense ,Sophos, Cyberoam, Cisco Meraki & ForcePoint Firewall deployment and maintenance IDS,IPS,NIDS,NIPS, Firewall
Meraki AP, UniFi , Alcatel ,Ruckus,TP link, Zyxel and Tenda AP deployment & maintenance WLAN Solutions
Bitwarden, Keeper Security & Keepass password manager implementation password managers
Standard operating procedure creation, training & implementation Process documentation and management
Technology training and training material design Training and Teaching
Documentation for knowledgebases Documentation
Standard operating procedure design and delivery SOP
Project management Project management
Lockpicking basics Physical Security Testing
Intune cloud only and hybrid deployment Intune and MDM
Exiv2 , Jimple Image Metadata Extraction
Pimeyes , Google Reverse Image Search, Smugmug Reverse Image Search

Tools

Network

Endpoint

SIEM

DNS

Malicious File & Link Analysis

Mail Header Analysis

OSINT

Projects

  • Pwnagotchi
  • Bad USB with Pico Pi & Circuit Python (Rick Roll, Credential Dump ,Reverse Shell)
  • RPI 5 Kali Attack & Defence box (Kali Linux & Kali Purple)
  • RPI 5 running docker ,Pi-hole with custom block lists,UniFi controller and LockKnife
  • Kali Nethunter Non-Rooted Android device

Popular repositories Loading

  1. Schecter333 Schecter333 Public