Skip to content
View jeffersoncesarantunes's full-sized avatar
  • Brazil

Block or report jeffersoncesarantunes

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

🐑 System Security Researcher | Low-Level & Kernel-Focused Developer 🐧

Typing SVG

Auditing kernels and inspecting memory β€” one syscall at a time.


πŸ“” About Me

I focus on working close to the system boundary β€” where operating systems actually behave, fail, and expose assumptions.

I avoid unnecessary abstractions and prefer understanding what happens underneath: memory layout, process behavior, and how the system enforces (or fails to enforce) its own protections.

Projects like K-Scanner and OpenSec come from this mindset β€” building small, transparent tools to observe and validate system behavior without hidden layers.

Most of my work follows a few core principles:

  • Push systems to their limits: stress memory layouts and process behavior until edge cases appear.
  • Keep it minimal and transparent: small tools written in C and Bash.
  • Focus on what matters: syscalls, memory management, and real exposure points.

Security is not about running tools β€” it’s about understanding how systems actually behave under pressure.


πŸ“« Get in Touch

Interested in system security, low-level internals, or these projects? Feel free to reach out β€” always open to a good conversation.


πŸ“Š GitHub Stats


πŸ“‚ Security Research & Labs

Independent projects focused on system behavior, memory analysis, and kernel-level security.

Project Description Stack
LinSpec Forensic kernel hardening audit tool for identifying defensive vulnerabilities. C
K-Scanner RWX memory region detection and analysis tool for Linux process auditing. C
S.I.R.E.N Interactive system triage tool for live forensic analysis and auditing. Bash
OpenSec OpenBSD mitigation auditor (W^X, ASLR, pledge, unveil) at process level. C

πŸ› οΈ Technical Stack & Environment

Daily tools and environment used for system development and security research.

  • πŸ–₯️ Core OS: OpenBSD & Arch Linux
  • πŸ’» Languages: C11, Bash
  • ⌨️ Editor: Neovim (AstroNvim)
  • πŸ” Focus: Memory Forensics, Kernel Mitigations, Process Behavior & Exploit Surface Analysis

🌐 Explore the Unix World

Different systems reflect different design philosophies β€” from minimalism to security hardening.


☣️ Security & Forensics Resources

Selected resources for studying system security, kernel internals, and real-world exploitation.


πŸ’Ύ Memory Internals & Exploitation

Understanding memory is fundamental to understanding system behavior β€” from virtual memory to real-world exploitation.


🀝 Contributing

Contributions are welcome. I value simplicity, safety, and transparency β€” especially in memory-related and low-level code. If you have ideas, improvements, or find something interesting, feel free to open an issue or reach out.

Popular repositories Loading

  1. OpenSec OpenSec Public

    🐑 OpenBSD security auditor: validating Pledge, Unveil and W^X mitigations.

    C

  2. K-Scanner K-Scanner Public

    🐧 Live Linux forensics: detecting RWX anomalies and fileless malware.

    C

  3. S.I.R.E.N S.I.R.E.N Public

    🐧 Live Linux forensics: real-time RAM streaming, integrity hashing and safety-aware memory acquisition.

    Shell

  4. jeffersoncesarantunes jeffersoncesarantunes Public

    🐑🐧Security ResearcheSecurity Researcher & System Security Developer: Focus on Kernel, Memory Forensics and Unix-like Systems.

  5. LinSpec LinSpec Public

    🐧Lightweight forensic kernel hardening audit tool for Linux security baseline verification.

    C