Skip to content
View behindsecurity's full-sized avatar

Organizations

@Infomundi-Project @hackersonsteroids

Block or report behindsecurity

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
behindsecurity/README.md

Hi there. My name is Guilherme Alves, and I'm an Offensive Security professional specializing in penetration testing and vulnerability research, with over three years of hands-on experience exploiting complex systems across web applications, Active Directory environments, and network infrastructure. Based in Brazil (but I'm also an EU citizen), I hold multiple industry certifications including HTB CPTS, THM PT1, eJPT and CompTIA Security+, and have successfully compromised over 250 vulnerable systems (Hack The Box machines) throughout my career. I'm also currently pursuing the Offensive Security Certified Professional (OSCP) certification.

Views

Professional Certifications

Certification Issuer Credential
Certified Red Team Operator (CRTO) Zero-Point Security Planned 2026.1
Offensive Security Certified Professional (OSCP) OffSec In Progress
HTB Certified Penetration Testing Specialist (CPTS) Hack The Box View Credential
THM Junior Penetration Tester (PT1) TryHackMe View Credential
eLearnSecurity Junior Penetration Tester (eJPTv1) INE Security View Credential
CompTIA Security+ CompTIA View Credential
Google Cybersecurity Professional Certificate Google View Credential

HackTheBox ProLabs

ProLab Certificate Number Status
Zephyr HTBCERT-768675B159 Completed
Dante HTBCERT-FFA98CDC18 Completed

All prolabs credentials verifiable at HackTheBox Certificates

Platforms

TryHackMe HackTheBox
TryHackMe behindsecurity

Projects

Co-Founder @ hackersOnSteroids (Dec. 2024 - Now)

hackersOnSteroids is brazil's #1 team on hack the box (htb). around 30 members on our main roster and growing. we're an international crew of hackers, pentesters, software engineers, malware/exploit writers, infra people, mobile sec folks, and some absolute HTB tryhards. based in brazil but we've got people from india, germany, usa, puerto rico, pakistan... basically everywhere.

what we do:

  • compete // every saturday we're grinding the HTB season. many of us cleared all active boxes already
  • share knowledge // on-demand internal writeups for active machines/challenges and other events outside hack the box. we also mentor newer hackers
  • infra // blog, collab platform, pentest reporting system, mailserver (@hos.team / @hackersonsteroids.org), plus tools we built ourselves to move faster.
  • partner up // we work with other like-minded teams like OSI and other crews globally. because hacking is better together

Writer @ BehindSecurity (Apr. 2023 - Now)

My commitment to education and knowledge sharing is evident through my role as the maintainer of BehindSecurity. Reaching over 6,000 readers per month, I use this online platform to:

  • share detailed documentation of the CTFs I've solved, and
  • post informative articles (from cybersecurity to programming and privacy).

This initiative not only solidifies my own understanding but also contributes to the community by providing resources for those looking to learn and grow in the field.

Co-Founder @ Infomundi (Sep. 2023 - Sep. 2025)

My technical foundation extends beyond offensive security. I served as a full-stack developer and systems administrator at the Infomundi Project. Infomundi is a Flask-based news aggregation and social platform that collects stories from RSS feeds worldwide, processes them with AI-powered summarization, and provides a social layer for users to engage with global news. The platform organizes content by geographic regions and categories, making it easy to discover news from any part of the world.

This dual perspective as both a builder and breaker gives me unique insight into how applications and infrastructure can be compromised, enabling me to provide comprehensive security assessments and actionable remediation strategies that development teams can actually implement.

A from-scratch build:

  • Backend: Flask 3.1 with Blueprints architecture, MySQL 8.0 with SQLAlchemy ORM, Redis 7, Flask-SocketIO with eventlet workers, OpenAI API for summarization, and security features like Flask-WTF (CSRF) and Flask-Limiter (rate limiting)
  • Frontend: Jinja2, Bootstrap 5, custom CSS and JS, Flask-Assets with minification, and Font Awesome for icons
  • Status: Open Source

Education

Institution Degree Expected Graduation Date
FIAP Technologist - Cyber Defense Feb, 2026

Languages

CEFR C2 Native
English Portuguese

Always up for collabs, code reviews, or a quick security chat.

Pinned Loading

  1. Infomundi-Project/website Infomundi-Project/website Public

    Code that fuels Infomundi's website.

    Python 3

  2. phpipam-rce-authenticated phpipam-rce-authenticated Public

    phpIPAM 1.4.5 - Remote Code Execution (RCE) (Authenticated)

    Python

  3. hackersonsteroids/website hackersonsteroids/website Public

    HTML 8