Skip to content
View regantemudo's full-sized avatar
🎯
Focusing
🎯
Focusing

Block or report regantemudo

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
ReganTemudo/ReadMe.md

πŸ‘‹ Hi there

About me:

  • πŸ”­ I work across Ethical Hacking, SOC Operations, and Threat Intelligence
  • 🌱 Currently sharpening Purple Team skills β€” offense meets detection
  • πŸ‘― Open to collaborating with serious cybersecurity researchers & builders
  • πŸ•΅οΈ Active in OSINT, dark web monitoring, and ransomware intelligence
  • πŸ“ƒ I write real-world security research, CTF writeups, and incident analysis
  • 🧠 Obsessed with understanding how attacks actually work in production
  • πŸ“¬ Contact: temudosys@proton.me

🧠 What I know & actually use

  • ChatGPT (for automation ideas, payload logic, research acceleration not magic exploits)
  • OSINT frameworks & dark web tooling
  • SIEM-driven detection & alert triage
  • CTF-style problem solving applied to real systems

🏴 Hangouts (Find me here)


πŸ“š I’m learning something new here

  • Advanced detection engineering
  • Malware & ransomware tradecraft
  • Blue Team tooling at scale
  • Automation for SOC workflows

☁️ Clouds & Infra

  • AWS
  • Cloudflare

πŸ§‘β€πŸ’» Languages I read other people's rich stuff, and write my own mess with

  • Python
  • Bash
  • PowerShell
  • JavaScript
  • PHP
  • C / C++
  • Java

πŸ”Œ When software isn’t enough

  • Raspberry Pi
  • Arduino

πŸ“Š GitHub Activity Snapshot

Mark streak


Top Story


pacman contribution graph

Pinned Loading

  1. dfir-playbooks dfir-playbooks Public

    Practical DFIR and incident response playbooks covering phishing, malware, ransomware, insider threats, and cloud security incidents for SOC and IR teams.

    PHP 1

  2. soc-detections soc-detections Public

    High-quality SOC detection rules and threat hunting content including Sigma, YARA, Suricata, and Snort rules focused on real-world attacker techniques.

    1