╔════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╗ ║ ████████╗███████╗██████╗ ███╗ ███╗██╗███╗ ██╗ █████╗ ██╗ ██╗ ██╗███████╗███╗ ██╗ ██████╗ ██████╗ ██╗ ║ ║ ╚══██╔══╝██╔════╝██╔══██╗████╗ ████║██║████╗ ██║ ██╔══██╗██║ ██║ ██╔╝██╔════╝████╗ ██║██╔═══██╗██╔══██╗██║ ║ ║ ██║ █████╗ ██████╔╝██╔████╔██║██║██╔██╗ ██║ ███████║██║ █████╔╝ █████╗ ██╔██╗ ██║██║ ██║██████╔╝██║ ║ ║ ██║ ██╔══╝ ██╔══██╗██║╚██╔╝██║██║██║╚██╗██║ ██╔══██║██║ ██╔═██╗ ██╔══╝ ██║╚██╗██║██║ ██║██╔══██╗██║ ║ ║ ██║ ███████╗██║ ██║██║ ╚═╝ ██║██║██║ ╚████║ ██║ ██║███████╗ ██║ ██╗███████╗██║ ╚████║╚██████╔╝██████╔╝██║ ║ ║ ╚═╝ ╚══════╝╚═╝ ╚═╝╚═╝ ╚═╝╚═╝╚═╝ ╚═══╝ ╚═╝ ╚═╝╚══════╝ ╚═╝ ╚═╝╚══════╝╚═╝ ╚═══╝ ╚═════╝ ╚═════╝ ╚═╝ ║ ╚════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╝ $ whoamiTimKenobi // Jedi Master of Code // Guardian of the Digital Galaxy Prescott Valley, AZ | Founder @ Pixel Space Technologies LLC "These aren't the vulnerabilities you're looking for... because I found them first."
┌──────────────────────────────────────────────────────────────────────────────┐ │ JEDI MASTER BY DAY. CODE SITH BY NIGHT? NAH, JUST A SECURITY WIZARD. │ │ │ │ I wield tools that scan the galaxy for secrets, monitor domains like the │ │ Eye of Sauron, and fortify defenses against subdomain takeovers. Quality │ │ over quantity — my repos are like the One Ring: powerful and not to be │ │ trifled with. │ │ │ │ When not battling vulnerabilities, you'll find me building LEGO starships, │ │ composing epic scores, or debating if the Nedry could out-hack the Grid. │ │ (Not if you didn't say the magic word.) Life, uh, finds a way... │ └──────────────────────────────────────────────────────────────────────────────┘ languages: primary: [Bash, Python, Powershell] secondary: [C, Dart, Flutter] tools: containers: Docker gui_frameworks: [PySide6, Dash] security_integrations: - TruffleHog - Gitleaks - Rapid7 Insight Platform - Webhooks - Jira interests: - Automation - domain_takeover_detection - subdomain_enumeration - dns_security_monitoring - dangling_cname_detection - secret_scanning - game_engine_development # Building from scratch, inspired by Tron grids - digital_audio_workstation # Composing like in Middle-Earth themes: - Star Wars: Force-sensitive security - Jurassic Park: Containing digital dinosaurs (vulnerabilities) - Tron: Navigating the vast digital grid - Lord of the Rings: Forging security ringsdrwxr-xr-x timkenobi staff the_good_stuff/ | Project | Description | Tech |
|---|---|---|
| DomainSentry | Domain security monitoring suite. Subdomain enumeration, dangling CNAME detection, cloud provider fingerprinting (AWS, Azure, 48+ patterns), SSL cert monitoring, automated email reports. Like a Jedi sentinel watching over your domains. | |
| Secret_Snipe | Secret scanner integration that hunts leaked credentials across repos. TruffleHog + Gitleaks orchestration with unified reporting. Sniping secrets like a bounty hunter in the Star Wars universe. | |
| ScriptWeaver | Desktop GUI (PySide6) for script management. Create, edit, and execute Python/Bash/PowerShell scripts with modular components. Weaving code like Gandalf weaves spells. | |
| DangleWatch | Dangling DNS record hunter. Finds orphaned CNAMEs before the bad guys do. Subdomain takeover prevention. Watching for dangles like a raptor in Jurassic Park. | |
| NetClassify | Network classification toolkit. Categorize and analyze network traffic patterns. Classifying nets like entering the Tron grid. | |
| ScoreForge | Flexible scoring/rating system framework. Build custom scoring logic for whatever you need to rank. Forging scores like the rings in Lord of the Rings. |
- Game Engine: Building a custom game engine from scratch. Inspired by epic quests in Middle-Earth and light cycles in Tron. (Coming soon – stay tuned!)
- Digital Audio Workstation (DAW): Crafting a DAW for music production. Perfect for composing scores that could rival John Williams' Star Wars themes or Jurassic Park adventures. (In development)
- Various IT Security Tools: Expanding the arsenal with more aspects of IT security – from advanced threat detection to AI-driven anomaly hunting. All in the spirit of keeping the digital world safe.
Want to collaborate on a security quest? Spot a vulnerability in the code? Or just want to discuss if the Force could derezz a program in Tron? I'll keep my communicator handy. $ exit logout Connection to TimKenobi closed.┌─────────────────────────────────────────────────────────────────┐ │ May the Force be with you... and your commits. │ └─────────────────────────────────────────────────────────────────┘ 
