Skip to content
View CodeEvent's full-sized avatar

Highlights

  • Pro

Block or report CodeEvent

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
CodeEvent/README.md

Typing SVG


[root@kali ~]$ cat /proc/operator/identity
┌─────────────────────────────────────────────────────────────┐
│  handle      :  Ermand Mani                                 │
│  location    :  Glasgow, Scotland  ████████ [OPSEC]         │
│  clearance   :  BEng (Hons) Cyber Security — UWS 2026       │
│  platforms   :  Kali Linux | Tails OS | Ubuntu Server       │
├─────────────────────────────────────────────────────────────┤
│  RESEARCH    :  SmartGuard — DeFi Fraud Detection           │
│  CONFERENCE  :  SIGiST 2026, London       [ACCEPTED]        │
│  PRECISION   :  100% | RECALL: 100% | F1: 100%              │
│  AUDIT MATCH :  BlockSec STRATOS-2024-001  [CORROBORATED]   │
├─────────────────────────────────────────────────────────────┤
│  SEEKING     :  SOC | Pentest | DFIR | AppSec | Blockchain  │
│  STATUS      :  OPEN TO HIRE  >>>  hi@ermand.uk             │
└─────────────────────────────────────────────────────────────┘

[root@kali ~]$ cat /etc/tools/arsenal.conf
[*] OPERATING SYSTEMS ──────────────────────────────────────
    ├── Kali Linux        offensive security platform
    ├── Tails OS          anonymous ops — everything through Tor
    └── Ubuntu Server     lab infrastructure

[*] OFFENSIVE ──────────────────────────────────────────────
    ├── Burp Suite        SQLi · XSS · CSRF · 2FA bypass
    ├── Metasploit        exploitation framework
    ├── Ettercap          ARP poisoning · MITM
    ├── Nmap              host discovery · port scanning
    └── Wireshark         deep packet inspection

[*] SIEM & DETECTION ───────────────────────────────────────
    ├── Wazuh             SIEM · HIDS · log correlation
    ├── Snort             IDS · custom rule authoring
    ├── Arpwatch          ARP change detection
    └── OSSEC v3.7        host intrusion detection

[*] NETWORK SECURITY ───────────────────────────────────────
    ├── OpenVPN 2.4       PKI · EasyRSA · X.509 certs
    ├── FreeRADIUS 3.0    AAA · 802.1X · RADIUS protocol
    ├── GRE Tunnelling    L2/L3 · Linux kernel + OVS
    └── iptables TEE      traffic mirroring for NIDS

[*] BLOCKCHAIN SECURITY ────────────────────────────────────
    ├── Slither 0.11.5    smart contract static analysis
    ├── SmartGuard        3x custom DeFi fraud detectors
    ├── Solidity 0.8      AST analysis · taint tracking
    └── DeFi Taxonomy     rug pulls · honeypots · flash loans

[*] DIGITAL FORENSICS ──────────────────────────────────────
    ├── Autopsy 4.21      disk forensics · artefact recovery
    ├── Volatility 2.6    memory forensics · malware detection
    ├── FTK Imager        E01 imaging · hash verification
    └── RegRipper 3.0     registry hive analysis

[*] LANGUAGES ──────────────────────────────────────────────
    ├── Python 3.10       detectors · pipelines · automation
    ├── Rust              memory-safe systems (no UAF, no BOF)
    ├── C++17             SEI CERT secure coding
    ├── Bash/PowerShell   scripting · recon · automation
    └── Solidity          smart contract vulnerability research

[root@kali ~]$ ls -la /ops/missions/
drwxr-xr-x  [BLOCKCHAIN]   SmartGuard/            Slither DeFi fraud detector · 100% F1 · SIGiST 2026
drwxr-xr-x  [DFIR]         Operation-FishNet/     ACPO forensics · DarkComet RAT · 50+ court exhibits
drwxr-xr-x  [OFFENSIVE]    OWASP-Pentest-Suite/   SQLi · XSS · CSRF · 2FA bypass · 89/100
drwxr-xr-x  [NETWORK]      Network-Security/      ARP poison · Snort IDS · OpenVPN · RADIUS · A2
drwxr-xr-x  [SECURE-CODE]  Secure-Programming/    SEI CERT C++ · Rust Hangman · DCL50 STR50 MEM51
drwxr-xr-x  [PYTHON]       Programming-for-Cyber/ HTTP brute force · DNS pipeline · HIBP API
Mission Objective Stack
🔐 SmartGuard DeFi fraud detector — 100% F1 — SIGiST 2026 Python · Slither · Solidity
🕵️ Operation FishNet ACPO DFIR — DarkComet RAT — 50+ exhibits Autopsy · Volatility · FTK
💉 OWASP Pentest Suite SQLi · XSS · CSRF · 2FA bypass — 89/100 Burp Suite · Python
🌐 Network Security ARP poison · Snort · OpenVPN · RADIUS — A2 Ettercap · Snort · FreeRADIUS
🔒 Secure Programming SEI CERT C++ remediation + Rust C++17 · Rust
🐍 Python Security Tools HTTP brute force · DNS pipeline Python · Sockets

[wazuh@siem ~]$ tail -f /var/ossec/logs/alerts/ops.log
** Alert 2026.04.17 11:42:03 UTC
   Rule 9001 (level 15) -> DISSERTATION SUBMITTED
   SmartGuard v1.0 — BEng Cyber Security — UWS
   Result: PASS

** Alert 2026.03.12 09:15:44 UTC
   Rule 9002 (level 15) -> PAPER ACCEPTED: SIGiST 2026 LONDON
   SmartGuard: DeFi fraud detection via static analysis
   Precision: 100% | Recall: 100% | F1: 100%

** Alert 2025.12.22 14:33:21 UTC
   Rule 9003 (level 13) -> DFIR INVESTIGATION COMPLETE
   DarkComet RAT identified via Volatility malfind plugin
   ACPO 2012 compliant — 50+ court exhibits — CoC maintained

** Alert 2025.11.30 16:08:55 UTC
   Rule 9004 (level 10) -> GRADE: A2 FIRST CLASS
   Network Security COMP10014 — 80-89%
   Labs: ARP Poison · Snort IDS · GRE · OpenVPN · RADIUS

** Alert 2025.05.01 10:22:17 UTC
   Rule 9005 (level 10) -> PENTEST ASSESSMENT: 89/100
   2FA bypass via SQLi · stored XSS session hijack · CSRF
   Targets: Juice Shop · Mutillidae · Security Shepherd

[root@kali ~]$ ./recon.py --target self --verbose

GitHub Streak

Activity Graph


[root@kali ~]$ cat /etc/legal/disclaimer.txt
All operations conducted exclusively in authorised academic
lab environments. No real systems were targeted.

[root@kali ~]$ ./connect.sh --operator "Ermand Mani"
[+] Initialising secure channel...
[+] linkedin  >>  linkedin.com/in/ermandmani
[+] email     >>  hi@ermand.uk
[+] web       >>  ermand.uk
[+] Status    >>  OPEN TO HIRE — actively seeking roles
[+] Done.

[root@kali ~]$ █

LinkedIn Email Website

Pinned Loading

  1. SmartGuard SmartGuard Public

    Slither-based DeFi fraud detector. 3 custom detectors. 100% precision/recall/F1 on 17-contract dataset. Accepted at SIGiST 2026, London.

    Solidity

  2. Network-Security Network-Security Public

    COMP10014 Network Security labs — UWS BEng Cyber Security. Grade: A2 (First-class). ARP Poisoning, Snort IDS, GRE, OpenVPN, RADIUS.

  3. OWASP-Pentest-Suite OWASP-Pentest-Suite Public

    Web application penetration testing — SQLi, XSS, CSRF, 2FA bypass, OSSEC. COMP09109 UWS. Grades: 45/50 + 44/50.

  4. Operation-FishNet Operation-FishNet Public

    ACPO-compliant digital forensic investigation. DarkComet RAT, volatile memory analysis, MD5 hash evidence, email forensics. 50+ court exhibits.

  5. Programming-for-Cyber-Security Programming-for-Cyber-Security Public

    COMP08101 Programming for Cyber Security — Python security tools, HTTP brute force, DNS pipeline. UWS 2024/25.

    Python

  6. Secure-Programming Secure-Programming Public

    COMP10068 Secure Programming — SEI CERT C++ vulnerability remediation (DCL50, STR50, MEM51, MSC51, ERR55) + Hangman in Rust. UWS.