Skip to content
View KeizerSec's full-sized avatar
🧑‍🍳
Cooking
🧑‍🍳
Cooking

Block or report KeizerSec

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
KeizerSec/README.md
Typing SVG

Profile views


👤 A propos

Passionné de cybersécurité en recherche active d'un premier poste SOC Analyst ou Threat Intelligence Junior.

En poste en support IT N1, je monte en compétence en parallèle via des labs, des CTF, de la recherche offensive et de la veille threat intel.

Je fais partie du top 2% mondial sur TryHackMe avec 179 rooms complétées et j'ai publié un whitepaper de recherche indépendante sur les architectures LLM multi-modèles (LitM).


🎯 Objectif

SOC Analyst N1/N2 ou Threat Intelligence Junior Disponible — Paris / Île-de-France / Remote


🛡️ Profil TryHackMe

TryHackMe

Rang mondial Rooms complétées Badges Niveau
Top 2% — #28398 179 28 [0xD][LEGEND]

Paths complétés : SOC Level 1 · Offensive Pentesting · Pre-Security


🧰 Stack technique

SOC & Detection

Windows Wireshark MITRE SIEM Forensic

Threat Intelligence

OSINT ThreatIntel Ransomware Underground

Tests de sécurité

Burp Metasploit Nmap AD

Dev & Infrastructure

Python Bash PowerShell Docker Azure Linux


📂 Projets

Projet Description Stack
🧠 LitM-Whitepaper Recherche indépendante sur les limites de l'alignement LLM face aux architectures multi-modèles. 38 273 LOC analysées. AI Security · Research
🔐 scan-vuln-ultime-pro Scanner de vulnérabilités automatisé : interface Flask, cache LRU, rate-limiting, export HTML, API REST. Containerisé Docker. Python · Flask · Docker · Nmap
🧬 Offensive-Research Notes de recherche offensive : analyse mémoire, syscalls, hooking Windows, Windows internals. C/C++ · Assembly · Windows
🔒 Cybersec-Lab Write-ups TryHackMe (Blue/EternalBlue, Kenobi, RootMe) + scripts Python (log parser SSH, Nmap templates). Python · Shell · Write-ups

📝 Write-ups & Labs notables

  • Active Directory Lab — Kerberoasting, DCSync, analyse Event IDs, mapping MITRE ATT&CK
  • EternalBlue (MS17-010) — Exploitation SMB via Metasploit, RCE, post-exploitation
  • Kenobi — ProFTPD + Samba NFS, PATH Variable Injection (PrivEsc)
  • Kernel Rootkit Analysis — Hooking syscall, persistence, analyse comportementale
  • Prompt Injection LLM — Bypass garde-fous, escalade de contexte, architectures multi-modèles

📊 Activité GitHub

Snake contribution animation

📬 Contact

Email TryHackMe Portfolio


Open to opportunities — SOC Analyst · Threat Intelligence · Blue Team

Pinned Loading

  1. LitM-Whitepaper LitM-Whitepaper Public

    Independent research on LLM alignment limits in multi-model architectures (LLM-in-the-Middle)

  2. KeizerSec KeizerSec Public