╔════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╗
║ ████████╗███████╗██████╗ ███╗ ███╗██╗███╗ ██╗ █████╗ ██╗ ██╗ ██╗███████╗███╗ ██╗ ██████╗ ██████╗ ██╗ ║
║ ╚══██╔══╝██╔════╝██╔══██╗████╗ ████║██║████╗ ██║ ██╔══██╗██║ ██║ ██╔╝██╔════╝████╗ ██║██╔═══██╗██╔══██╗██║ ║
║ ██║ █████╗ ██████╔╝██╔████╔██║██║██╔██╗ ██║ ███████║██║ █████╔╝ █████╗ ██╔██╗ ██║██║ ██║██████╔╝██║ ║
║ ██║ ██╔══╝ ██╔══██╗██║╚██╔╝██║██║██║╚██╗██║ ██╔══██║██║ ██╔═██╗ ██╔══╝ ██║╚██╗██║██║ ██║██╔══██╗██║ ║
║ ██║ ███████╗██║ ██║██║ ╚═╝ ██║██║██║ ╚████║ ██║ ██║███████╗ ██║ ██╗███████╗██║ ╚████║╚██████╔╝██████╔╝██║ ║
║ ╚═╝ ╚══════╝╚═╝ ╚═╝╚═╝ ╚═╝╚═╝╚═╝ ╚═══╝ ╚═╝ ╚═╝╚══════╝ ╚═╝ ╚═╝╚══════╝╚═╝ ╚═══╝ ╚═════╝ ╚═════╝ ╚═╝ ║
╚════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╝
$ whoamiTimKenobi // Jedi Master of Code // Guardian of the Digital Galaxy
Prescott Valley, AZ | Founder @ Pixel Space Technologies LLC
"These aren't the vulnerabilities you're looking for... because I found them first."
┌──────────────────────────────────────────────────────────────────────────────┐
│ JEDI MASTER BY DAY. CODE SITH BY NIGHT? NAH, JUST A SECURITY WIZARD. │
│ │
│ I wield tools that scan the galaxy for secrets, monitor domains like the │
│ Eye of Sauron, and fortify defenses against subdomain takeovers. Quality │
│ over quantity — my repos are like the One Ring: powerful and not to be │
│ trifled with. │
│ │
│ When not battling vulnerabilities, you'll find me building LEGO starships, │
│ composing epic scores, or debating if the Nedry could out-hack the Grid. │
│ (Not if you didn't say the magic word.) Life, uh, finds a way... │
└──────────────────────────────────────────────────────────────────────────────┘
languages:
primary: [Bash, Python, Powershell]
secondary: [C, Dart, Flutter]
tools:
containers: Docker
gui_frameworks: [PySide6, Dash]
security_integrations:
- TruffleHog
- Gitleaks
- Rapid7 Insight Platform
- Webhooks
- Jira
interests:
- Automation
- domain_takeover_detection
- subdomain_enumeration
- dns_security_monitoring
- dangling_cname_detection
- secret_scanning
- game_engine_development # Building from scratch, inspired by Tron grids
- digital_audio_workstation # Composing like in Middle-Earth
themes:
- Star Wars: Force-sensitive security
- Jurassic Park: Containing digital dinosaurs (vulnerabilities)
- Tron: Navigating the vast digital grid
- Lord of the Rings: Forging security ringsdrwxr-xr-x timkenobi staff the_good_stuff/
| Project | Description | Tech |
|---|---|---|
| DomainSentry | Domain security monitoring suite. Subdomain enumeration, dangling CNAME detection, cloud provider fingerprinting (AWS, Azure, 48+ patterns), SSL cert monitoring, automated email reports. Like a Jedi sentinel watching over your domains. | |
| Secret_Snipe | Secret scanner integration that hunts leaked credentials across repos. TruffleHog + Gitleaks orchestration with unified reporting. Sniping secrets like a bounty hunter in the Star Wars universe. | |
| ScriptWeaver | Desktop GUI (PySide6) for script management. Create, edit, and execute Python/Bash/PowerShell scripts with modular components. Weaving code like Gandalf weaves spells. | |
| DangleWatch | Dangling DNS record hunter. Finds orphaned CNAMEs before the bad guys do. Subdomain takeover prevention. Watching for dangles like a raptor in Jurassic Park. | |
| NetClassify | Network classification toolkit. Categorize and analyze network traffic patterns. Classifying nets like entering the Tron grid. | |
| ScoreForge | Flexible scoring/rating system framework. Build custom scoring logic for whatever you need to rank. Forging scores like the rings in Lord of the Rings. |
- Game Engine: Building a custom game engine from scratch. Inspired by epic quests in Middle-Earth and light cycles in Tron. (Coming soon – stay tuned!)
- Digital Audio Workstation (DAW): Crafting a DAW for music production. Perfect for composing scores that could rival John Williams' Star Wars themes or Jurassic Park adventures. (In development)
- Various IT Security Tools: Expanding the arsenal with more aspects of IT security – from advanced threat detection to AI-driven anomaly hunting. All in the spirit of keeping the digital world safe.
Want to collaborate on a security quest? Spot a vulnerability in the code?
Or just want to discuss if the Force could derezz a program in Tron?
I'll keep my communicator handy.
$ exit
logout
Connection to TimKenobi closed.┌─────────────────────────────────────────────────────────────────┐
│ May the Force be with you... and your commits. │
└─────────────────────────────────────────────────────────────────┘
