description cover coverY layout
My name is Johan (mind2hex) Giraldo and i am a cybersecurity student. I firmly believe that one of the best methods to learn is by practicing.
.gitbook/assets/WhatsApp Image 2024-04-18 at 8.57.14 AM.jpeg
-794.7753608815426
cover title description tableOfContents outline pagination
visible size
true
hero
visible
true
visible
true
visible
true
visible
true
visible
true

💾 Who am i?


Pic of me at RootedCon 2024


EDUCATION

  • Bachelor's degree in computer science completed at the Instituto Comercial Panamá.
  • Studying a cybersecurity degree at the Universidad Tecnológica de Panamá.

ACHIEVEMENTS

​Third place Copa Airlines Hackathon 2022 (Infraestructure as Code).

I found it to be an excellent challenge and i acquired a basic knowledge of Terraform.

First place Innova Banesco Challenge 2022 (Web App development).

A very interesting challenge in which knowledge of Python programming, web design and databases is used.

Fifth place Copa Airlines Hackathon 2023 (Cloud Computing).

A challenge that i personally found a bit complicated, however very interesting in which we applied knowledge of cloud computing with Kubernets on AWS.

Participation in the JIC-UTP 2023 (Jornada de Iniciación Cientifíca) at the Universidad Tecnológica de Panamá

Presenting the project "prototype of IDS in network traffic using AI"


PROJECTS

adb_hunter (Bash)

Bash script to enumerate ADB devices with shell access without autentication. With this script you can check if you can access an ADB device using command adb. It downloads automatically targets using shodan or you can specify a single target using -t <target_ip> .

Usage

Usage: adb_hunter.sh [options]

Options:
  -h, --help          Show this help message and exit
  -v, --version       Show script version and exit
  -t, --target        Specify a single target instead of test targets from shodan
  -s, --save          Dont delete result file (vulnerable_targets.txt)
Crackahash (Python)

Crackahash is a tool written in python that let you crack hashes from your desktop machine. Simply start a SSH service and an ngrok tunnel in your laptop from anywhere and crackahash will connect and download the juicy hash from your laptop using ngrok API, after that, it will start hashcat optimized to use your GPU to crack the hash and if succeed, it will send the password to your email.

Usage

WirelessWizard (Python)

Python project uploaded to pypi.org. This project is used to handle wireless interfaces using python.

Usage

WebToolkit (Python)

Tools for web pentesting.

WebCrawl

               _      _____                    _ 
              | |    / ____|                  | |
 __      _____| |__ | |     _ __ __ ___      _| |
 \ \ /\ / / _ \ '_ \| |    | '__/ _` \ \ /\ / / |
  \ V  V /  __/ |_) | |____| | | (_| |\ V  V /| |
   \_/\_/ \___|_.__/ \_____|_|  \__,_| \_/\_/ |_|
                                                 
    author:  mind2hex
    version: 1.0
    
usage: ./WebCrawler.py [options] -u {url} 

a simple python web crawler

options:
  -h, --help           show this help message and exit
  -u , --url           target url. ex --> http://localhost/
  -H , --headers       set HTTP headers. ex --> 'Header1=lol&Header2=lol'
  -P , --proxies       set proxies. ex --> 'http;http://proxy1:8080,https;http://proxy2:8000'
  -D , --download      coma separated extension files to download. ex --> jpg,pdf,png
  -x , --exclude-url   comma separated domains to exclude. ex --> google.com,youtube.com
  -U , --user-agent    specify user agent
  -N, --no-follow      follow redirections
  --rand-user-agent    randomize user-agent
  --usage              show usage examples
  --ignore-errors      ignore connection errors
  -d , --depth         max crawling depth

performance options:
  -rt , --retries      retries per connections if connection fail [default 0]

debugging options:
  -v, --verbose        show verbose messages
  --debug              show debugging messages
  -o , --output        save indexed urls to a file
  -q, --quiet          dont show config before execution

https://github.com/mind2hex/

WebEnum

               _     ______                       
              | |   |  ____|                      
 __      _____| |__ | |__   _ __  _   _ _ __ ___     _
 \ \ /\ / / _ \ '_ \|  __| | '_ \| | | | '_ ` _ \   |-|  __
  \ V  V /  __/ |_) | |____| | | | |_| | | | | | |  |=| [wE]
   \_/\_/ \___|_.__/|______|_| |_|\__,_|_| |_| |_|  "^" ====`o   
                                                  
    author:  mind2hex
    version: 1.0
    
usage: ./webEnum.py [options] -u {url} -w {wordlist}

a simple python web directory enumerator

options:
  -h, --help            show this help message and exit
  -u , --url            target url to enumerate                  - example '-u http://localhost:6969/'
  -w , --wordlist       wordlist path to use in enumeration      - example '-w /path/to/wordlist.txt'
  -W , --gen-wordlist   create wordlist using a dir structure    - example '-W /home/user/Downloads/wordpress/'
  -M , --http-method    HTTP Method to use                       - example '-M GET'
  -H , --headers        http headers to use in every request     - example '-H Header1=foo&Header2=bar'
  -A , --user-agent     specify user agent. default[yoMamma]     - example '-ua yoMamma'
  -C , --cookies        cookies to use in every request          - example '-C Cookie1=foo&Cookie2=bar'
  -b , --body-data      body data to send using POST method      - example '-b username=admin&password=admin'
  -P , --proxy          proxies to send every request            - example '-P http=http://localhost:6969'
  -x , --extension      additional extensions to probe           - example '-x php,js,txt'
  -j, --json            send post data in json format            - example '-j -b {'username':'admin'}'
  -s, --add-slash       add slash to every word in wordlist      - 
  -f, --follow          follow redirections.                     - default[False]
  -R, --randomize-ua    randomize user agent.                    - default[False]
  -I, --ignore-errors   ignore connection errors                 - 
  --usage               show usage                               - 
  -V, --verify          verify certificate                       - default[False]

performance options:
  -t , --threads        threads. default[01]                     - example '-t 10'
  -to , --timeout       time to wait for a response default[10]  - example '-to 10'
  -tw , --timewait      time to wait between requests default[0] - example '-tw 10'
  -rt , --retries       retry failed connections                 - example '-rt 10'

debugging options:
  -v, --verbose         show verbose messages                    - 
  -d, --debug           show debugging messages                  - 
  -o , --output         save output to a file                    - example '-o output.txt'
  -q, --quiet           dont show config before execution        - 

filter options:
  -hs , --hs-filter     hide responses using status code         - example '-hs 500,400'
  -hc , --hc-filter     hide responses using content length      - example '-hc nnnn,nnn'
  -hw , --hw-filter     hide responses using web server          - example '-hw nginx'
  -hr , --hr-filter     hide responses using regex               - example '-hr failed'

https://github.com/mind2hex/

WebFuzz

               _     ______                      
              | |   |  ____|                     
 __      _____| |__ | |__ _   _ ___________ _ __ 
 \ \ /\ / / _ \ '_ \|  __| | | |_  /_  / _ \ '__|
  \ V  V /  __/ |_) | |  | |_| |/ / / /  __/ |   
   \_/\_/ \___|_.__/|_|   \__,_/___/___\___|_|   
                                                 
    author:  mind2hex
    version: 1.0
    
usage: ./webFuzzer.py [options] -u {url} -w {wordlist}

a simple python multithreading web fuzzer

options:
  -h, --help           show this help message and exit
  -u , --url           target url. ex --> http://localhost/FUZZ
  -w , --wordlist      wordlist
  -b , --body-data     body data to send using POST method. ex --> 'username=admin&password=FUZZ'
  -C , --cookies       set cookies. ex --> 'Cookie1=lol&Cookie2=lol'
  -H , --headers       set HTTP headers. ex --> 'Header1=lol&Header2=lol'
  -P , --proxies       set proxies. ex --> 'http;http://proxy1:8080,https;http://proxy2:8000'
  -U , --user-agent    specify user agent
  -M , --http-method   HTTP to use. [GET|POST|HEAD]
  --magic              specify magic word [default:FUZZ]
  -js, --json          if specified, then body data should be json. ex --> -b {'username':'FUZZ'}
  -f, --follow         follow redirections
  --rand-user-agent    randomize user-agent
  --usage              show usage examples
  --ignore-errors      ignore connection errors, useful to enumerate fuzz subdomains

performance options:
  -t , --threads       threads [default 1]
  -to , --timeout      time to wait for response in seconds [default 10]
  -tw , --timewait     time to wait between each requests in seconds [default 0]
  -rt , --retries      retries per connections if connection fail [default 0]

debugging options:
  -v, --verbose        show verbose messages
  -d, --debug          show debugging messages
  -o , --output        save output to a file
  -q, --quiet          dont show config before execution

filter options:
  -hs , --hs-filter    hide responses with the specified status codes. ex: '300,400'
  -hc , --hc-filter    hide responses with the specified content lenghts. ex: '1234,4321'
  -hw , --hw-filter    hide responses with the specified web servers. ex: 'apache,nginx'
  -hr , --hr-filter    hide responses matching the specified pattern. ex: 'authentication failed'

https://github.com/mind2hex/

NetRunner (Python)

Remote Administration Tool written in python.

Usage

$ python3 NetRunner.py -h
usage: ./netrunner.py [options] 

Remote Administration Tool

options:
  -h, --help        show this help message and exit
  -l, --listen      start server mode, listen on specified port
  -p , --port       specified port
  -t , --target     specified IP
  --max-listeners   specified max listening sessions. default[5]
  --password        Specify password for NetRunner server

Examples:
        # start a NetRunner in servermode 
        ./NetRunner.py -t 192.168.0.1 -p 5555 -l 

        # conect to a NetRunner server using NetRunner in client mode
        ./netrunner.py -t 192.168.0.1 -p 5555 

        NetRunnerCommands Engine
        # To use NRC Engine, we should first connect to a NR server using NR client

        # SHOW NRC HELP
        netrunner: #> $NRC HELP   

        # SHOW NRC MODULE HELP
        netrunner: #> $NRC [MODULE_NAME] HELP

https://github.com/mind2hex/

TCPCobra (Python)

A simple python tcp proxy.

Usage

$ python3 TCPCobra.py -h 
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣀⡀⠀⣀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⢠⣴⣾⡿⠿⠿⠿⠷⠦⠿⠿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠉⡉⠛⢠⣾⣷⡀⠰⣦⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠸⠇⠀⣈⣀⣀⣀⣀⠈⠂⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠲⣶⡄⠘⠛⠛⠛⠛⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠙⢷⡀⠻⣿⠿⠿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠉⠀⠀⢴⣶⣶⡄⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠉⢁⣤⣤⡀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀TCPCobra⠀⠀⠛⠋⣉⣀⠀⠀⠀⠀⠀⠀ author: mind2hex⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠸⣿⣿⣷⡀⠀⠀⠀⠀version:⠀1.0⠀⠀
⠀⠀⠀⠀⣀⣠⣤⣶⠶⠶⠟⠛⠛⠛⠋⠁⠀⠀⠀⣿⣿⣿⣧⠀⣀⡀⠀⠀⠀⠀
⠀⠀⠀⠰⣿⣿⠷⠶⠶⠿⠿⠿⠿⠿⠿⠿⠿⠿⢁⣿⣿⣿⣿⠀⠿⢛⣻⡆⠀⠀
⠀⠀⢀⣠⣤⣤⣤⣶⣶⣶⣶⣶⡶⠶⠖⠒⢀⣤⣾⣿⣿⣿⡟⢀⣾⣿⡿⠃⠀⠀
⠀⠀⠘⠿⣿⣿⣿⣷⣶⣶⣶⣶⣶⣶⣶⣿⣿⣿⣿⡿⠿⠋⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠉⠉⠉⠉⠉⠉⠉⠉⠉⠉⠉⠁⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀

Usage: ./proxy.py [localhost] [localport] [remotehost] [remoteport] [receive_first] Example: ./proxy.py 127.0.0.1 9000 10.12.132.1 9000 True
IMAR Panama (Python Flask)

Back-End of IMAR Panama web page.

HackPack USB (Python, Bash, Powershell)

Kit of tools that i carry in my USB to automate enumeration and looting.

CVE's PoC (Python, Bash)

I have developed some exploits for CVE's which you cand find in my github account.

  • CVE-2022-39986: bash script for automated discovery and exploitation of machines with the CVE-2022-39986 vulnerability.
  • CVE-2021-31630: OpenPLC 3 WebServer Authenticated Remote Code Execution.

You can see more projects i have been working on in this gitbook or my github account if you want.

Here you'll find:

  • Write-ups from cybersecurity platforms like hackthebox, tryhackme, microcorruption, etc.
  • Programming languages documentation, tips and tools i made.
  • Cybersecurity topics.

WRITE UPS

{% content-ref url="write-ups/hackthebox/" %} hackthebox {% endcontent-ref %}

{% content-ref url="write-ups/microcorruption/" %} microcorruption {% endcontent-ref %}


PROGRAMMING

{% content-ref url="programming/python.md" %} python.md {% endcontent-ref %}


CYBERSECURITY

{% content-ref url="cybersecurity-topics/networking/" %} networking {% endcontent-ref %}

{% content-ref url="cybersecurity-topics/web.md" %} web.md {% endcontent-ref %}

{% content-ref url="cybersecurity-topics/binary-analysis/" %} binary-analysis {% endcontent-ref %}


OTHERS

My Github account where i upload all tools i developed.

{% embed url="https://github.com/mind2hex/" %} My Github Account {% endembed %}

You might also be interested in checking out my hacker group's blog where i regularly upload content oriented to cybersecurity topics.

{% embed url="https://zerotrustoffsec.com/blog/" %} ZeroTrustOffsec {% endembed %}


CONTACT ME

{% embed url="https://www.linkedin.com/in/johan-giraldo-785a06268" %}