Skip to content
View praisi-tech's full-sized avatar

Block or report praisi-tech

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
praisi-tech/README.md

PRAISILIA ANASTASYA

Offensive Security | Web Exploitation | OSINT | Cryptography


Profile

Offensive security practitioner specializing in identifying, exploiting, and analyzing vulnerabilities across modern web applications and digital footprints.
Approach centered on adversarial thinking, disciplined methodology, and precision in both exploitation and documentation.

Focus areas:

  • Web exploitation (RCE, SSRF, IDOR, LFI/RFI, XXE, upload bypasses)
  • Cryptanalysis and CTF cipher challenges
  • OSINT investigations and metadata intelligence
  • Secure coding for Android and web platforms
  • Methodical enumeration, exploitation, and remediation reporting

Current Work

CTF 2025 Offensive Security Portfolio

Professional-level writeups covering:

  • Web exploitation chains
  • OSINT identity reconstruction
  • RSA and XOR cryptanalysis
  • Forensic-style problem solving
    Designed with a pentest-report mindset, not student-level narrative.

Web Exploitation Labs

Reproduction and exploitation of high-impact vulnerabilities:

  • Template injection to remote code execution
  • SSRF leading to internal network exposure
  • File upload → server-side execution
  • Wrapper-based local file inclusion
  • Broken access control escalation

Secure Notes Application (Android/Java)

Security-focused Android project implementing:

  • Encrypted local storage
  • Authentication logic
  • Defensive coding patterns
  • Modular design for future hardening

Technical Competencies

Offensive Security

  • Manual exploitation over tool-reliance
  • Attack surface mapping and threat modeling
  • Payload construction and bypass strategies
  • Input validation subversion
  • Code-assisted vulnerability research

Cryptography

  • RSA low-exponent recovery
  • XOR key extraction and inversion
  • Classical cipher reconstruction
  • Fault pattern detection

OSINT

  • Metadata extraction and correlation
  • Geolocation tracing from visual signals
  • Username pivoting across platforms
  • Behavioral and digital footprint analysis

Development

Languages: Java, Python, C++, JavaScript, SQL, HTML/CSS
Frameworks/Platforms: JSP/Servlets, Android Studio
Security tooling: Burp Suite, Kali Linux, curl, grep, SQLmap, dig, exiftool, Packet Tracer


Objectives for 2026

  • Release full offensive CTF portfolio with professional-standard documentation
  • Develop Python tooling for reconnaissance and automation
  • Advance secure development practices across Android and web
  • Participate regularly in CTF competitions
  • Pursue foundational certifications (eJPT, Security+)
  • Build toward an IT consulting path focused on security and AI systems

Contact

GitHub: https://github.com/praisi-tech
Email: [email protected]


"In a world of noise, precision wins."

Popular repositories Loading

  1. ChillSpace ChillSpace Public

  2. praisi-tech praisi-tech Public

  3. Secure-NoteApp Secure-NoteApp Public

  4. AgriTrade-CMS AgriTrade-CMS Public

    PHP

  5. SecureNote SecureNote Public

    Java 1

  6. wirelessappfirewal wirelessappfirewal Public

    PHP