Skip to content
View Daxxtropezz's full-sized avatar
:shipit:
0wn. r3v34l. r3bu1ld.
:shipit:
0wn. r3v34l. r3bu1ld.

Organizations

@clever-gang

Block or report Daxxtropezz

Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
daxxtropezz/README.md

Header

daxxtropezz

Typing SVG

mindmap
  root{{Daxxtropezz}} 
      FE)Frontend(
        React
        Typescript
        Javascript
        Flutter
        FlutterFlow
        Figma
      BE))Backend((
        Java
        Python
        C++
        C#
        Dart
      DB)Databases(
        MySQL
        Supabase
        Firebase
        Redis
      TO)Tools and DevOps(
        JIRA
        Git and GitHub
        Docker
        Linux
        VS Code
        Wireshark
        Nmap
        Bloodhound
        Burp Suite
      OFF))Offensive Security((
        Red Team Operations
          Adversary Emulation
          Engagement Planning
          Rules of Engagement
        Reconnaissance
          OSINT
          Footprinting
          Social Engineering
        Vulnerability Discovery
          Web Application Testing
          Network Scanning and Enumeration
          Service Version Discovery
        Exploitation
          Manual Exploitation Techniques
          Exploit Development
          Privilege Escalation
          Exploitation Frameworks
            Metasploit
            Cobalt Strike
        Post-Exploitation
          Lateral Movement
          Persistence
          Credential Harvesting
          Bloodhound Usage
        Offensive Tooling and Techniques
          Nmap Scripts
          Burp Extensions
          Custom Recon Scripts
          Payloads and Stagers
        Reporting and Remediation Guidance
          Evidence Collection
          Actionable Remediation
        Active Directory Pentesting
          AD Reconnaissance
            LDAP Enumeration
            Domain Enumeration
            Kerberoasting
            AS-REP Roasting
            DNS and SRV Records
          AD Attack Techniques
            Pass-the-Hash
            Pass-the-Ticket
            Overpass-the-Hash
            Golden Ticket
            Lateral Movement via AD
          AD Tooling
            Bloodhound
            Mimikatz
            CrackMapExec
            Impacket
            Responder
          AD Post-Exploitation
            Domain Persistence
            Abusing GPOs and Scheduled Tasks
            ACL and Privilege Misconfiguration Abuse
        Web Pentesting
          Recon and Mapping
            Subdomain Discovery
            Virtual Host Discovery
            Content Discovery
          Common Vulnerabilities
            SQL Injection
            Cross Site Scripting
            Cross Site Request Forgery
            Server Side Request Forgery
            Local File Inclusion
            Remote File Inclusion
            Insecure Direct Object References
            Authentication and Authorization Bypass
            Parameter Tampering
          Testing Techniques
            Manual Burp Testing
            Automated Scanners
            Fuzzing and Input Manipulation
            Source Review and Dynamic Analysis
          Web Tooling
            Burp Suite
            OWASP ZAP
            SQLMap
            Nikto
            wfuzz
      CL)Cloud Skills(
        AWS
        Azure
        GCP
        Kubernetes
        Docker
        Terraform
        CI CD
        Serverless
        VPC and Networking
        IAM and Secrets
        S3 and Cloud Storage
        RDS and Cloud Databases
        Observability and Logging
      SP)Specialized Skills(
        Secure Coding Awareness
        API Security Testing
        Authentication and 2FA Testing
        Threat Modeling attacker POV
        Security Automation offensive tooling
Loading

Professional Connectivity Channels

Stack Overflow Profile Behance Portfolio LinkedIn Profile Professional Email

For professional inquiries, collaboration opportunities, or technical discussions

whoami

🔴 Red Teamer — Offensive security specialist (CRTA, CEH) with expertise in ethical hacking, adversary emulation, OWASP Top 10 exploitation, and evasion techniques
🔐 Cybersecurity — Penetration Testing, Vulnerability Management, Risk Assessment, Social Engineering, InfoSec Analysis 🤖 AI & ML — Python, Deep Learning, NLP, Computer Vision, Generative AI, Data Analysis & Visualization
📦 DevSecOps & Cloud — CI/CD with Docker, Kubernetes, Nginx, AWS, Linode, Cloud Security & Storage
⚙️ Automation — Python & Bash scripting, Linux, Debugging, Code Review, Data Validation
🧠 Fullstack Developer — Vue.js, React, TypeScript, JavaScript, Laravel, shadcn, TailwindCSS, Inertia.js, RESTful APIs, SQL/NoSQL

🏅 Badge Showcase

Click the icon badges to view more information about the badge

C|EH Badge C|EH Badge
Certified | Ethical Hacker

Google IT Automation with Python
Google IT Automation with Python
Cyber Threat Management
Cyber Threat Management
Ethical Hacker
Ethical Hacker
Oracle OCI 2023 Certified Foundations Associate
OCI 2023 Certified Foundations Associate
AWS File Storage
AWS Knowledge: File Storage
AWS Serverless
AWS Knowledge: Serverless
Google AI Essentials
Google AI Essentials V1
AI in the Cloud
AI in the Cloud
AI Fundamentals
Artificial Intelligence Fundamentals
OCI 2023 AI Certified Foundations Associate
OCI 2023 AI Certified Foundations Associate
LFD121: Developing Secure Software
LFD121: Developing Secure Software
Oracle Cloud Data Management 2023 Certified Foundations Associate
Oracle Cloud Data Management 2023 Certified Foundations Associate

🧠 Automated Security Testing & CI/CD

To maintain high security standards across development, and integrates automated vulnerability testing within its CI/CD pipeline.

⚙️ Implementation Highlights

  • Security Testing Frameworks: OWASP ZAP, Bandit (Python), and npm audit for dependency checks
  • Continuous Integration: GitHub Actions run automated scans on each push or pull request
  • Coverage: SQL Injection, XSS, CSRF, insecure authentication, and dependency vulnerabilities
  • Reports: Detailed vulnerability reports are generated to guide secure code fixes

💡 Benefits

  • Detects and prevents common web application vulnerabilities early
  • Promotes secure development practices across all repositories
  • Builds trust by ensuring continuous security validation

GitHub Statistics

activity-graph graph activity-graph graph
daxxtropezz
stats graph streak graph

🏆 My Trophies

trophy graph

Tech Stack

Top Languages

Frontend Backend Databases DevOps & Cloud Cybersecurity Machine Learning

React JS

Node JS

MongoDB

Docker

Kali Linux

TensorFlow

Vue JS

Laravel

MySQL

Kubernetes
Burp Suite PyTorch
Next.js Express.js
Postgre SQL
Vercel Nmap scikit-learn
Angular NestJS
Redis
AWS Metasploit
Keras
shadcn/ui
Springboot

Graph QL
Azure Wireshark Pandas
Material UI FastAPI Firebase Terraform OWASP NumPy

Extras

TryHackMe
Visitor Graph
  • 🏢 I'm currently working on Artificial Intelligence, Machine Learning, Oracle, Red Teaming, & Ethical Hacking 🧑🏻‍💻
  • ☑️ Fun fact: I think I'm funny 🐦‍⬛

Support My Work

Support me on Ko-fi    Buy Me A Coffee
daxxtropezz Footer

Pinned Loading

  1. bloodhound-cheatsheet bloodhound-cheatsheet Public

    A clear and structured cheatsheet designed for BloodHound users. This guide explains what BloodHound does, how to install it from scratch, and how to run common AD enumeration and analysis tasks. B…

    13

  2. nmap-cheatsheet nmap-cheatsheet Public

    🛡️ A handy Nmap cheat sheet for ethical hackers and cybersecurity enthusiasts. Includes common scan types, flags, and usage examples for quick reference.

    7

  3. IPGetter IPGetter Public

    A simple Java NetBeans application that retrieves the IP address of a given domain name. IPGetter helps users convert URLs like google.com into their corresponding IP addresses, making it useful fo…

    Java 3

  4. cmd-portfolio cmd-portfolio Public

    JavaScript 3