Thanks to visit codestin.com
Credit goes to github.com

Skip to content
View AptAmoeba's full-sized avatar
📺
Re-watching Frieren again
📺
Re-watching Frieren again

Organizations

@irchaosclub

Block or report AptAmoeba

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
AptAmoeba/README.md

Hello!!!1!

I'm Amoeba (aka BunchOfWetFrogs, or Austin),

I'm Currently:

ASM logo | Scheduling my Certified Red Team Operator exam

C-lang logo | Self-teaching C for Malware Development

ASM logo | Trying to poorly Reverse Engineer a firmware dump

Fishy | Poking some 4head's phishing server because he isn't filtering SSH sources


stats graph languages graph

> Vocational

I'm currently a Security Engineer & Internal Pentester (both physcial and digital). I also do Malware Analysis/Development, and Threat Detection Engineering.

I aspire to become a Red Teamer someday, and am very interested in both Malware Development, operations, and continuing physical pentesting.

> Personal

I'm a wannabe polymath and citizen scientist:

  • I do Microbiology research (particularly Protozoology topics/community Protist identification)
  • I love Astrophotography & collecting Astronomy data (exoplanet lightcurves, galaxy/molecular cloud imaging, etc.)
  • I also enjoy doing various CompSci projects & analyzing random malware samples that I come across.

Languages

Language Usage
C logo C Malware Development & RE literacy
Python logo Python Scripting & development
PowerShell logo PowerShell Scripting & development
Bash logo Shell & Batch Simple system scripting
CS logo CQL CrowdStrike SIEM query lang
MS Defender Logo KQL Microsoft MDE/Sentinel Threat Hunting
GraphQL logo GraphQL API Interaction
Terraform logo Terraform (Primarily AWS) Infrastructure as Code lang.


Pinned Loading

  1. Malware-Library Malware-Library Public

    Malware samples I have found & investigated in the wild. Not pulled from existing sources.

    2

  2. AWS-EC2-AutoStop AWS-EC2-AutoStop Public

    Too lazy to press the "Stop Instance" option in the AWS console after concluding an EC2 session? Me too!

    PowerShell

  3. Malware-Development-Study Malware-Development-Study Public

    A small repo to aggregate my MalDev study materials into one place so I can close like 200 browser tabs.

    C 1

  4. KQL-Threat-Hunting KQL-Threat-Hunting Public

    A collection of Threat Hunting & Alert queries I've written for 365 Defender's 'Advanced Threat Hunting'