Who is Velsez?
My fascination with cybersecurity has been a significant aspect of my life, reflecting the serendipitous nature of personal and professional development. At the age of 11, following a relocation to Brazil with my mother, I encountered a substantial language barrier, particularly in Portuguese, which posed significant challenges in both communication and academics. This period was characterized by considerable upheaval and adaptation.
During this transformative phase, my laptop served as a sanctuary. What began as a modest computing setup evolved into an advanced gaming PC, providing not only an escape but also a gateway into the realms of reverse engineering, game modification, and an exploration of networking and software engineering. This marked the beginning of an enduring engagement with technology, averaging more than eight hours daily from a young age, which has since become a defining element of my identity.
Technology, for me, transcends mere interest; it is the medium through which I connect with peers, express my creativity, and pursue continuous learning. My journey in the tech world is driven by an insatiable curiosity about the intricacies of computers, software engineering, and the ever-evolving landscape of technological innovation. This relentless pursuit of knowledge is fueled by the dynamic nature of the field, where new discoveries and challenges emerge daily.
In addition to my personal projects, my professional experience includes developing solutions for companies whose operations are distinct from my primary interests. This work has further broadened my expertise and underscored the versatility and applicability of my skills across various domains.
- Obsentry (2023)
- Helped create the IDS/IPS Systems, in collaboration with a team and worked with them in Detection of anti-viruses including creating our own signature detection and MIL integrating machine learning into the system to stay at the highest advantage!
- Set up IP-Table with filtering, API in correlation with OBSentry framework and servers with Kubernetes for virtualization and firewall setups.
- Uploaded files undergo identification through hash signatures with, corresponding data stored in a MySQL database additionally users have the ability to mark files as potentially infected
- Checked packets and processes for specific HASH signatures that could be malicious, if they are blackholing the connection and or quarantining it in a virtualized environment.
- Nymotic (2021)
- Created Most of the systems in collaboration with a team and Did alot of customer support, managed the load balancing alongside other things.
- Developed Python and Perl scripts to blacklist malicious connections and monitor network traffic
- Established Host Intrusion Detection Systems (HIDS), Intrusion Prevention Systems (IPS), Network, Intrusion Detection Systems (NIDS), and filtering systems.
- User Database: Used MySQL to store usernames and passwords with a key system that granted access to services upon purchase, Emails and passwords were encrypted and hashed.
- Created a system that would log incoming traffic and check for packet signatures and blacklist it if it was malicious and while alerting users if the network is under threat
------------------
Built-in Commands
------------------
about, education, projects, skills, contact, download, clear, info, connectme