Skip to content
View f3nr1rs3c's full-sized avatar
☠️
Ethical Hacker
☠️
Ethical Hacker

Block or report f3nr1rs3c

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
f3nr1rs3c/README.md
linkedln offsec

Hi there! I'm Doğukan İSPİRLİ - (Sirius)

💫 Who Am I:

🛡️ | Offensive Security Researcher
⚔️ | Penetration Testing Specialist
🛠️ | Red Team Security Developer
✍️ | Cyber Security Content Writer

❤️ I work on Red Team operations and Penetration Testing processes.
📝 I write a technology blog on Medium! https://medium.com/@dogukan.ispirli
📫 To contact me, send an email. dogukan.ispirli08@gmail.com
📄 You can contact us via LinkedIn for more information, https://www.linkedin.com/in/dogukan-ispirli/

🗡️ Advensary Emulations and Red Team Operations

I am developing my skills in conducting penetration testing and security audits in the following areas, within the framework of industry standards (OWASP, PTES, NIST, MITRE ATT&CK):

  • 🏢 Internal Network Penetration Testing: I conduct research on lateral movement, privilege escalation, Kerberos-based attacks, and domain controller takeover techniques in internal networks.
  • 🌍 External Network Penetration Testing: I identify vulnerabilities, open port services, and configuration errors in the organization's internet-facing perimeter.
  • 📶 Wireless Network Penetration Testing: I perform security checks for WEP/WPA/WPA2/WPA3 enterprise networks, rogue network attacks, client isolation tests, and wireless network bypass techniques.
  • 🌐 Web Application Penetration Testing: Business logic flaws in advanced web architectures, API vulnerabilities, and in-depth vulnerability analysis according to OWASP Top 10 standards.
  • 📱 Mobile Application Penetration Testing: Reverse engineering, dynamic/static analysis, and secure data storage evaluations on Android and iOS platforms.
  • 🎭 Social Engineering Testing: I measure an organization's security awareness by testing employees' human-related vulnerabilities using phishing, vishing, and similar scenarios.
  • 🏢 Physical Penetration Testing: I assess an organization’s physical security by testing unauthorized access scenarios and identifying weaknesses in physical controls.

💻 Teknolojiler & Araçlar | Tech Stack & Tools

⚙️ Programming & Scripting

Python Bash PowerShell

🛡️ Offensive Security Tools

Metasploit Burp Suite Nmap Hashcat Sqlmap BloodHound Ghidra

🖥️ Operating Systems & Platforms

Kali Linux Active Directory Linux Debian Windows VS Code Git Docker

📊 GitHub Stats



GitHub Streak

Pinned Loading

  1. Sysmon_IR_Configuration Sysmon_IR_Configuration Public

    Incident Response (IR) ve tehdit tespiti odaklı optimize edilmiş bir Sysmon konfigürasyonu içerir.

  2. AdminHunter AdminHunter Public

    AdminHunter is a Python script used to detect admin login panels of web servers.

    Python

  3. LinSentry LinSentry Public

    Linux sistemlerde yetki yükseltme (Privilege Escalation) risklerini hızlı ve güvenli şekilde analiz etmek için geliştirilmiş hafif bir denetim aracıdır.

    Shell 1

  4. WAFSeeker WAFSeeker Public

    Web Application Firewall Detection Tool

    Python

  5. vExec vExec Public

    vCenter veya ESXi üzerindeki bir sanal makine içinde, **VMware Tools** aracılığıyla uzaktan komut veya program çalıştırmaya yarayan bir Python aracıdır.

    Python 3

  6. vCollector vCollector Public

    vCenter veya ESXi üzerindeki tüm sanal makinelerin sistem bilgilerini otomatik olarak toplayan Python tabanlı araç.

    Python 1