Skip to content
View releaseown's full-sized avatar
🏴
at work
🏴
at work

Block or report releaseown

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
releaseown/README.md

Rian Júnior

HackTheBox HackingClub LeetCode TryHackMe

About me

My name is Rian Júnior, an enthusiast and practitioner of offensive security. Passionate about technology, vulnerabilities, exploitation, and deep system understanding.

Red Team · Pentest · Threat Simulation · Threat Hunter

More about me
  • Name: Rian Júnior (Release)
  • Country: Brazil / SP
  • Exploitation and technical analysis
  • Web vulnerabilities
  • Automation and tool development
  • Red Team & Threat Simulation methodologies

Pinned Loading

  1. analysis-and-poc-n8n-CVE-2025-68613 analysis-and-poc-n8n-CVE-2025-68613 Public

    Technical study of the CVE-2025-68613 vulnerability in n8n, covering affected versions, laboratory exploration scenario, offensive and defensive analysis, and mitigation strategies.

    JavaScript 1

  2. exploit-js2py exploit-js2py Public

    The CVE-2024-28397 vulnerability affects versions of js2py up to v0.74, a Python library that allows JavaScript code to be executed within the Python interpreter.

    PHP 1

  3. SOC114-Malicious-Attachment-Detected-Phishing-Alert-Walkthrough SOC114-Malicious-Attachment-Detected-Phishing-Alert-Walkthrough Public

    Walkthrough SOC114 — Phishing Analysis with Malicious Attachment, IOCs, YARA, and Filescan/VirusTotal Correlation

    YARA 1