Skip to content
View CorvusH4ck's full-sized avatar
🏠
Working from home
🏠
Working from home

Block or report CorvusH4ck

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
CorvusH4ck/README.md

Rafael Morinigo | Corvus DDoSKrom

┌──(corvus㉿ddoskrom)-[~]
└─$ cat /etc/profile

[*] Initializing profile...
[+] User: Rafael Morinigo
[+] Alias: Corvus DDoSKrom
[+] Role: Penetration Tester @ Corvus H4ck
[+] Location: Paraguay
[+] Status: Co-Founder @ SIGEA Platform
[*] Profile loaded successfully.

$ whoami

corvus@ddoskrom:~$ cat about.txt

Pentester especializado en assessment de vulnerabilidades y desarrollo
de herramientas de seguridad. Co-fundador de SIGEA - plataforma SaaS que
democratiza la ciberseguridad para PyMES en LATAM.

Certificaciones: EC-Council E|HE | N|DE
Comunidad: Kavacon Member | CTF Player
Experiencia: Desde 2019 en ciberseguridad ofensiva

$ ls -la /skills

corvus@ddoskrom:~$ ls -la /skills/

drwxr-xr-x  pentesting/
  -rwxr-xr-x  metasploit
  -rwxr-xr-x  burp_suite
  -rwxr-xr-x  nmap
  -rwxr-xr-x  wireshark
  -rwxr-xr-x  kali_linux

drwxr-xr-x  development/
  -rwxr-xr-x  python
  -rwxr-xr-x  php
  -rwxr-xr-x  javascript
  -rwxr-xr-x  react
  -rwxr-xr-x  bash
  -rwxr-xr-x  mysql

drwxr-xr-x  automation/
  -rwxr-xr-x  n8n
  -rwxr-xr-x  docker
  -rwxr-xr-x  git

$ ./current_projects.sh

corvus@ddoskrom:~$ ./current_projects.sh

[+] Executing current projects...

[1] SIGEA Platform (Co-Founder)
    ├─ Vulnerability Scanner
    ├─ SIEM Implementation
    ├─ EDR Module
    └─ Automated Pentesting Workflows
    Status: [████████░░] 80% - Active Development

[2] Pentesting Automation Framework
    └─ n8n-based pentesting workflows
    Status: [██████████] 100% - Production

[3] CTF Writeups & Labs
    └─ Knowledge sharing platform
    Status: [██████░░░░] 60% - Ongoing

[!] All projects running smoothly.

$ cat /var/log/achievements.log

corvus@ddoskrom:~$ tail -f /var/log/achievements.log

[2019-XX-XX] Started journey in cybersecurity
[2024-XX-XX] Obtained EC-Council E|HE certification
[2024-XX-XX] Obtained EC-Council N|DE certification
[2024-XX-XX] Co-founded SIGEA Platform
[2024-XX-XX] Joined Corvus H4ck team
[2024-XX-XX] Active participant in Black Alpaca CTF
[2024-XX-XX] Kavacon community member
[2025-XX-XX] Building cybersecurity ecosystem in Paraguay
[2025-XX-XX] Developing automated pentesting tools
[ONGOING] Solving CTF challenges
[ONGOING] Creating security content

corvus@ddoskrom:~$ curl https://api.github.com/users/CorvusH4ck/stats

{
  "username": "CorvusH4ck",
  "focus": [
    "Penetration Testing",
    "Security Tools Development",
    "Web Application Security",
    "Network Security",
    "CTF Competitions"
  ],
  "current_learning": "Rust for network tools",
  "certifications": 2,
  "active_projects": 3,
  "years_of_experience": 6,
  "coffee_level": "critical ☕"
}

$ netcat -lvp 4444

corvus@ddoskrom:~$ netcat -lvp 4444
Listening on 0.0.0.0 4444

[*] Waiting for connections...
[+] Connection received from:

📧 Email: [email protected]
🔗 LinkedIn: linkedin.com/in/rafael-morinigo-1637491bb
🐙 GitHub: github.com/CorvusH4ck
🐦 Twitter: @corvus_ddoskrom

[*] Feel free to connect!

$ echo $MOTTO

corvus@ddoskrom:~$ echo $MOTTO

"Breaking systems to build better security."

$ history | tail -n 3

corvus@ddoskrom:~$ history | tail -n 3

  999  cd /workspace/sigea
 1000  git commit -m "Building the future of cybersecurity in LATAM"
 1001  ./deploy.sh --target production

corvus@ddoskrom:~$ uptime
System uptime: Securing LATAM since 2019
Load average: ██████████ (Constantly learning)

corvus@ddoskrom:~$ █

Built with ❤️ and 🐧 in Paraguay

Pinned Loading

  1. Arduino-LCD_I2C Arduino-LCD_I2C Public

    C++

  2. keylogger keylogger Public

    Python 1

  3. Policlinico Policlinico Public

    PHP 2

  4. safeVPN-THM safeVPN-THM Public

    Forked from Wh1teDrvg0n/safeVPN-THM

    iptables rules to only have incoming connections from the machine on TryHackMe

    Shell

  5. web-hacking-playground web-hacking-playground Public

    Forked from takito1812/web-hacking-playground

    Web application with vulnerabilities found in real cases, both in pentests and in Bug Bounty programs.

    Python