Skip to content
View ibfavas's full-sized avatar
🎯
Focusing
🎯
Focusing

Block or report ibfavas

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
ibfavas/README.md

Hi πŸ‘‹, I'm MOHAMMAD FAVAS S

πŸ” Cybersecurity Researcher | Bug Bounty Hunter | VAPT Enthusiast

πŸ“ Kerala, India β€’ Focus: Web Exploitation & Bug Bounty Hunting

Breaking web applications, one assumption at a time.


πŸ‘¨β€πŸ’» About Me

  • πŸ” Cybersecurity enthusiast focused on Web & Network Security
  • πŸ§ͺ Strong hands-on experience with labs, attack simulations & system hardening
  • ⚑ Interested in SSRF, IDOR, RCE, Privilege Escalation
  • 🧩 Approach: Understand systems deeply β†’ break them β†’ secure them

βš’οΈ Core Expertise

  • 🌐 Web Application Security Testing (VAPT)
  • πŸ” Reconnaissance & Attack Surface Mapping
  • πŸ§ͺ Exploit Development & PoC Creation
  • πŸ›‘οΈ Linux System Hardening & Secure Configurations
  • πŸ“‘ Network Analysis & Traffic Inspection

πŸ› οΈ Tools & Technologies


πŸ’» Open Source Tools

πŸš€ Peelr: Lightweight JavaScript Scanner

  • Built a lightweight JS scanner in Go to optimize local recon and faster triage.
  • Identifies hardcoded secrets, risky client-side sinks, prototype pollution patterns, and GraphQL clues.
  • Maps basic source-to-sink flows and features both a CLI and local Web UI.
  • Developed utilizing only the standard library for maximum speed and zero-dependency execution.
  • πŸ”— Check out Peelr

πŸ§ͺ Security Labs & Research

πŸ” Virtualized Attack & Defense Lab

  • Built a multi-node lab using Hyper-V
  • Simulated real-world attack scenarios (Kali vs Metasploitable2)
  • Configured network isolation to prevent traffic leakage
  • Implemented system hardening (SSH keys, UFW, non-root access)

🏰 Vulnerable Machine Development (Infinity Castle)

  • Designed intentionally vulnerable environment for hands-on exploitation
  • Practiced web attacks using Burp Suite (interception & manipulation)
  • Integrated credential extraction challenges (Hashcat, Steganography)
  • Simulated privilege escalation paths and misconfigurations

πŸ›‘οΈ System Hardening & Security Practices

  • Applied Linux system hardening techniques
  • Secured environments using firewall rules (UFW)
  • Configured secure authentication mechanisms (SSH key-based access)

🎯 Current Focus

  • πŸ” Advanced Bug Bounty Hunting
  • ⚑ Exploit chaining (multi-step vulnerabilities)
  • 🧠 Deep dive into API Security & Logic Flaws
  • πŸ›‘οΈ Blue Team basics (SOC workflows & detection)

πŸ“ˆ Activity Graph


🧠 Certifications & Learning

  • πŸ›‘οΈ Certified SOC Analyst (CSA)
  • πŸ” Certified in Cybersecurity (ISC2)
  • πŸ§ͺ TryHackMe – Jr Penetration Tester Path

πŸ“« Connect With Me


⚑ Mindset

"Security is not about tools. It's about understanding systems well enough to break assumptions."

Pinned Loading

  1. peelr peelr Public

    Fast JS security scanner β€” API keys, XSS sinks, taint flows, prototype pollution. CLI + web UI.

    Go