Skip to content
View regantemudo's full-sized avatar
🎯
Focusing
🎯
Focusing

Block or report regantemudo

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
regantemudo/ReadMe.md

Hi My name is Regan Temudo

Cybersecurity Enthusiast | Ethical Hacker | CTF Creator

I'm passionate about cybersecurity, ethical hacking, and solving complex CTF challenges. I love exploring security vulnerabilities, creating engaging challenges, and sharing my knowledge with the community.

  • 🌍  I'm based in India
  • 🤝  I'm open to collaborating on Cybersecurity research projects
  • 🤝 CTF challenge creation and competitions
  • 🤝 Ethical hacking and pentesting engagements
  • ⚡  Enjoys solving complex puzzles and exploring the latest security trends

Skills

PythonPHPJavaScriptJavaGitC++CGNU BashSublime TextVimVS CodeHTML5CSS3OracleMongoDBMySQLPostgreSQLMetaMaskEthereumSolanaHardhatWordpressAmazon Web ServicesArduinoBlenderDockerLinux

Socials

Badges

My GitHub Stats

regantemudo's GitHub stats

Popular repositories Loading

  1. ReganTemudo ReganTemudo Public

    Config files for my GitHub profile.

  2. regantemudo.github.io regantemudo.github.io Public

    JavaScript

  3. WordPress-with-MySQL-using-Docker-Compose WordPress-with-MySQL-using-Docker-Compose Public

  4. PHP-file-read-to-RCE-CVE-2024-2961- PHP-file-read-to-RCE-CVE-2024-2961- Public

    To use, implement the Remote class, which tells the exploit how to send the payload.

    Python

  5. teampass-exploit- teampass-exploit- Public

    This script exploits a vulnerability in Teampass by injecting arbitrary SQL queries to enumerate users and passwords.

    Shell