Skip to content
View regantemudo's full-sized avatar
🎯
Focusing
🎯
Focusing

Block or report regantemudo

Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
ReganTemudo/ReadMe.md

πŸ‘‹ Hi there

About me:

  • πŸ”­ I work across Ethical Hacking, SOC Operations, and Threat Intelligence
  • 🌱 Currently sharpening Purple Team skills β€” offense meets detection
  • πŸ‘― Open to collaborating with serious cybersecurity researchers & builders
  • πŸ•΅οΈ Active in OSINT, dark web monitoring, and ransomware intelligence
  • πŸ“ƒ I write real-world security research, CTF writeups, and incident analysis
  • 🧠 Obsessed with understanding how attacks actually work in production
  • πŸ“¬ Contact: temudosys@proton.me

🧠 What I know & actually use

  • ChatGPT (for automation ideas, payload logic, research acceleration not magic exploits)
  • OSINT frameworks & dark web tooling
  • SIEM-driven detection & alert triage
  • CTF-style problem solving applied to real systems

🏴 Hangouts (Find me here)


πŸ“š I’m learning something new here

  • Advanced detection engineering
  • Malware & ransomware tradecraft
  • Blue Team tooling at scale
  • Automation for SOC workflows

☁️ Clouds & Infra

  • AWS
  • Cloudflare

πŸ§‘β€πŸ’» Languages I read other people's rich stuff, and write my own mess with

  • Python
  • Bash
  • PowerShell
  • JavaScript
  • PHP
  • C / C++
  • Java

πŸ”Œ When software isn’t enough

  • Raspberry Pi
  • Arduino

πŸ“Š GitHub Activity Snapshot

Mark streak


Top Story


pacman contribution graph

Pinned Loading

  1. dfir-playbooks dfir-playbooks Public

    Practical DFIR and incident response playbooks covering phishing, malware, ransomware, insider threats, and cloud security incidents for SOC and IR teams.

    PHP 1

  2. soc-detections soc-detections Public

    High-quality SOC detection rules and threat hunting content including Sigma, YARA, Suricata, and Snort rules focused on real-world attacker techniques.

    1