Skip to content
View jon-brandy's full-sized avatar
🧬
Psalms 91:1-16
🧬
Psalms 91:1-16
  • PT ITSEC Asia Tbk
  • Jakarta, Indonesia
  • LinkedIn in/nicsap

Organizations

@ImaginaryCTF @TCP1P @csc-research-development @baycysec @PETIRsec

Block or report jon-brandy

Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
jon-brandy/README.md

Hi there πŸ‘‹

πŸ”’ DFIR Consultant | Defensive Content Engineer | Black Hat Asia & USA 2025 Arsenal Speaker

I am a fresh graduate in Cybersecurity with a strong passion for Digital Forensics & Incident Response (DFIR), Malware Analysis, and Binary Exploitation. As an active member of the international CTF teams ImaginaryCTF, I contribute to challenge development and consistently engage in solving problems in the PWN and Forensics categories.

Beyond competitions, I regularly create both offensive and defensive cybersecurity content engineering practical scenarios, tools, and educational materials. I’m eager to continue growing in the field and secure a cybersecurity role where I can make a meaningful impact in defending digital infrastructure.

πŸ“œ Certifications:

  • EC Council - Computer Hacking Forensic Invesigator (CHFIv11).
  • eLearn Certified Digital Forensics Professional (eCDFPv2).
  • EC Council - Certified Incident Handler (ECIHv3).
  • EC Council - Digital Forensics Professional (DFEv1).
  • Certified Mobile Penetration Tester - Android (CMPen).
  • Certified Cloud Security Practitioner AWS (CCSP-AWS).
  • Certified Network Security Practitioner (CNSP).
  • Certified Appsec Practitioner (CAP).

🎯 FYI:

I absolutely enjoy writing HackTheBox writeups on machines, Sherlocks, and solving PWN CTF challenges. You can find some of my work on my Repo, where I share my solutions and knowledge.

Pinned Loading

  1. hackthebox hackthebox Public

    My WriteUps for HackTheBox CTFs, Machines, and Sherlocks.

    Python 156 26

  2. baycysec/plaguards baycysec/plaguards Public

    Plaguards: Open Source PowerShell Deobfuscation and IOC Detection Engine for Blue Teams. [Presented at Black Hat Asia and USA 2025 Arsenal]

    Python 17 4

  3. HolmesGeo HolmesGeo Public

    A simple, modular tool for extracting and analyzing IP addresses from multiple sources.

    Python 1 1

  4. baycysec/sigurd baycysec/sigurd Public

    Sigurd is a research-oriented malware sample, specifically a Remote Access Trojan (RAT), used to support digital forensics, incident response training, and CTF-style forensic challenges.