Skip to content
View affix's full-sized avatar
:shipit:
Code never lies, Comments might though
:shipit:
Code never lies, Comments might though

Organizations

@EpicGames

Block or report affix

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
affix/README.md

Keiran Smith | Affix

I’m Keiran Smith, known online as Affix. As an OSCE3 certified penetration tester, I have a deep passion for cybersecurity and ethical hacking. My mission is to strengthen digital defenses and ensure the integrity and security of information systems.

🔒 Expertise

  • Penetration Testing: Skilled in identifying and exploiting vulnerabilities in networks, applications, and systems.
  • Red Teaming: Experienced in simulating advanced adversary techniques to test and improve organizational security.
  • Cybersecurity Research: Continuously learning and researching new attack vectors and defense mechanisms.
  • Security Audits: Conducting thorough security assessments and providing actionable remediation steps.
  • DevOps: Integrating security best practices into the development and deployment lifecycle.
  • SecOps: Collaborating with security and operations teams to enhance incident response and threat detection.
  • Development: Creating custom tools and scripts to automate security tasks and improve efficiency.

🛠️ Skills

  • Programming Languages: Go, Rust, Ruby, Python, PHP, Java, C/C++, Swift, ASM (x86, amd64, aarch64, armv7), Bash, PowerShell
  • Tools & Frameworks: Metasploit, Cobal Strike, Sliver, Burp Suite, Nmap, Wireshark, Linux
  • Cloud Security: AWS, Azure, GCP security best practices
  • Operating Systems: Proficient with Linux, Windows, and macOS environments

📚 Certifications

  • OSCE3: Offensive Security Certified Expert
  • OSWE : Offensive Security Web Expert
  • OSEP : Offensive Security Experiesed Penetration Tester
  • OSED : Offensive Security Exploit Developer
  • OSCP : Offensive Security Certified Professional

Checkout my Accredible Wallet

Currently Working Towards:

  • CRTO: Certified Red Team Operator
  • CRTOII: Certified Red Team Operator II

🌐 Projects

On this GitHub, you’ll find a collection of my projects, tools, and scripts related to penetration testing and cybersecurity. These projects reflect my ongoing commitment to the field and my desire to share knowledge with the community.

🌱 Continuous Learning

Cybersecurity is an ever-evolving field, and I am dedicated to staying ahead of the curve. Whether through certifications, courses, or hands-on experience, I constantly seek opportunities to expand my knowledge and skills.

🤝 Let's Connect

I am always open to collaboration, knowledge sharing, and connecting with fellow cybersecurity professionals. Feel free to reach out if you have any questions, ideas, or just want to chat about the latest in cybersecurity.

Pinned Loading

  1. doopla doopla Public

    URL De-duplicator for pentesting and bug bounty

    Go 1

  2. go-todo-api go-todo-api Public

    Building a ToDo API with Golang and Kubernetes!

    Go 6 1

  3. OpenFaaS-SNS OpenFaaS-SNS Public

    A Demo function to handle SNS messages in OpenFaaS

    Go 6

  4. openfaas-nats-connector openfaas-nats-connector Public

    Trigger your OpenFaas functions with NATS

    Ruby 6

  5. vala-jwt vala-jwt Public

    A native Vala JWT Client with HS256 Support

    Vala 2

  6. osed-scripts osed-scripts Public

    Forked from epi052/osed-scripts

    bespoke tooling for offensive security's Windows Usermode Exploit Dev course (OSED)

    Python 5 1