Skip to content
View aherreros-dev's full-sized avatar

Block or report aherreros-dev

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
aherreros-dev/README.md

Matrix Glitch Typing SVG

Big Data | Machine Learning | Cybersecurity

redr4ven profile image


Languages, Tools & Technologies


About Me

I’m an undergraduate student in Computer Engineering with a strong foundation in programming languages and data systems.

My current focus is on:

  • Building scalable systems with Big Data technologies (Apache Spark, Cloudera).
  • Designing intelligent solutions using PyTorch and TensorFlow.
  • Exploring secure computing, cryptography, and cybersecurity research.

Comfortable working with:

  • Linux-based distros (esp. Kali Linux)
  • Terminal workflows with zsh, fish, and Neovim

🚩 Offensive Security & Adversarial Research

I focus on the technical intersection of Big Data Analytics and Offensive Security, leveraging automated data processing to identify attack surfaces.

  • Vulnerability Research: Analyzing software binaries and web architectures for common OWASP Top 10 vulnerabilities and logic flaws.
  • Post-Exploitation: Developing custom payloads for Lateral Movement and maintaining persistence in Unix-based environments.
  • Infrastructure: Hardening and auditing distributed systems (Hadoop/Spark clusters) against unauthorized access.
  • CTF Focus: Active in pwn, crypto, and web categories.

Featured Security Engagements (RootedCON 2026)

I am actively involved in the Spanish cybersecurity scene, specifically focusing on hardware exploitation and complex CTF environments.

  • Hardware Hacking CTF – Official RootedCON PACMAN Badge:
    • Performed technical analysis and vulnerability exploitation on the official RootedCON hardware.
    • Executed Reverse Engineering on the SoC ESP32-WROOM-32E, firmware extraction and interface analysis (UART/JTAG).
  • Var Group Iberia & Yarix CTF:
    • Ranked 13th overall out of ~250 participants in a highly competitive, multi-domain laboratory.
    • Tackled advanced scenarios spanning Active Directory (privilege escalation, lateral movement), Web Security, and Artificial Intelligence vulnerabilities.
    • Applied a Purple Team methodology, correlating offensive exploit execution (Red Team) with defensive threat detection and infrastructure hardening (Blue Team).

Stats

GitHub Stats

Top Languages

GitHub Streak


Connect with Me


Tags

Pinned Loading

  1. ravenOS_rooted26_badge ravenOS_rooted26_badge Public

    Bare-metal Wi-Fi auditing suite for the ROOTEDCON 2026 ESP32 badge, featuring Evil Twin, Deauth, and crypto utilities.

    C++ 1