Cyber Defense • AppSec • Red Team • Security Automation
🌐 cybersecelite.com • 💻 github • 🔗 linkedin • 🧠 medium
Name: Diyorbek Juraev
Handle: diorjuraev
Role: Cyber Defense / AppSec / Red Team
Status: ACTIVE
Focus: Offensive Security • Detection • Automation • Tooling
Location: US[OFFENSIVE]
- Reconnaissance & Enumeration
- Attack Surface Discovery
- Payload-oriented scripting
- Credential attack workflow familiarity
- Flipper Zero / BadUSB ecosystem exposure
[DEFENSIVE]
- Threat monitoring
- Log analysis
- Linux hardening
- SSH / access control awareness
- Detection-minded security operations
[ENGINEERING]
- Security automation
- API development
- Scripting & tooling
- GitHub-based workflow
- DevSecOps mindsetLanguages:
- Python
- PowerShell
- Java
- C#
- JavaScript
- HTML
Systems:
- Linux / Ubuntu
- Networking / TCP-IP / Ports
- Git / GitHub
- Server-side security workflow
Tooling:
- FastAPI
- Docker
- Nmap
- Gobuster
- Hydra
- Wireshark
- Metasploit
- Automation scriptsnmap -sS -sV target.local
gobuster dir -u https://target.com -w wordlist.txt
hydra -l admin -P rockyou.txt ssh://192.168.1.1
python3 scanner.py --mode aggressive
tcpdump -i eth0 port 443+ Threat detection: ACTIVE
+ Recon pipelines: RUNNING
+ Automation mindset: DEPLOYED
+ Learning mode: CONTINUOUS
- System compromise: NONE DETECTED
root@cyberdeck:~# exit
SESSION TERMINATED // SECURE CHANNEL CLOSED