Skip to content
View D-C4ptain's full-sized avatar
💭
Ready
💭
Ready

Organizations

@DSCRongo @fr334aks-mini @Th3-Shield @planet-22

Block or report D-C4ptain

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
D-C4ptain/README.md

Hi there, thank you for stopping by 👋

I'm a software developer and cyber security enthusiast. Python, is my main development tool for both security and web applications. I'm very passionate about cyber security, I spend much of my spare time learning and obsessing about the latest hacks, for web, cryptography, pwn. I spend most of my time learning and obsessing about new and existing security issues.


📫 🤝 Connect and Reach out to me: 👇

# Skills:

  • Cyber Security:

    • Web App Penetration Testing.
    • Network Penetration Testing.
    • CTF Player.
    • Tools: Burpsuite, Nmap, Nessus, OpenVAS, wireshark, gobuster, aircrack-ng, metasploit, impacket...
  • 🔭 I’m currently working on Client projects.

  • 🌱 I'm currently learning Privilege escalation and malware.

  • 💬 Ask me about Cybersecurity.

And by the way, There are many ways of killing a rat!

Top Languages and Tools:

Visual Studio Code

HTML5

CSS3

Sass

JavaScript

Django

Python

C++

Linux

MySQL Git GitHub

:octocat: My stats


TryHackMe

Pinned Loading

  1. keylogger Public

    One of the oldest forms of cyber threat, keyloggers record keystrokes typed in the keyboard and send them to a third party.

    Python 6 3

  2. decrypt-md5-hash Public

    A simple python script that goes through a wordlist to decrypt an MD5 hash.

    Python 7 2

  3. portservicename Public

    This is just a simple python script to identify some of the common ports you may come across during enumeration or in daily network activities.

    Python 2 1

  4. Django-Task-List Public

    A to do list app With User Authentication.

    Python

  5. kiterioc Public

    A multiplatform IOC hunter for Cyber Threat Intelligence

    Python

8 contributions in the last year

Contribution Graph
Day of Week March April May June July August September October November December January February March
Sunday
Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
Less
No contributions.
Low contributions.
Medium-low contributions.
Medium-high contributions.
High contributions.
More

Activity overview

Loading A graph representing D-C4ptain's contributions from March 24, 2024 to March 26, 2025. The contributions are 100% commits, 0% issues, 0% pull requests, 0% code review.

Contribution activity

March 2025

D-C4ptain has no activity yet for this period.
Loading