Skip to content
View OnlineUnknowns's full-sized avatar
🎯
Focusing
🎯
Focusing

Block or report OnlineUnknowns

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
OnlineUnknowns/README.md

🚀 OT/ICS Security Specialist


⚡ Tech Stack

I code with

react logo javascript logo typescript logo nodejs logo aftereffects logo android logo anaconda logo aws logo androidstudio logo angular logo bootstrap logo c logo canva logo cplusplus logo css logo django logo express logo figma logo firebase logo flask logo git logo github logo mongodb logo mysql logo python logo tailwind logo docker logo kubernetes logo redis logo vuejs logo nextjs logo tensorflow logo blender logo unity logo

# Unknown 🌌

YouTube Subscribe WhatsApp Support LinkedIn GitHub

Full Stack Developer | Cybersecurity Expert | Network Specialist 👨‍💻


🚀 Career Timeline

  • 2018: Joined as a Cybersecurity Analyst at].
  • 2015: Started contributing to Open Source Projects.
  • 2013: Developed multiple Full Stack applications for clients.
  • 2010: Obtained a certification in Network Administration.

⚙️ Skills

Skill Description
Web Development HTML, CSS, JavaScript, React, Node.js
Cybersecurity Penetration Testing, Forensic Analysis, Threat Detection
Networking Cisco, Juniper, VPN, Network Troubleshooting
Database SQL, MongoDB, PostgreSQL

📜 Certifications

  • Certification in Network Administration 📃
  • Certification in Cybersecurity 🔐

Typing SVG


Typing SVG


Projects Status Automation Stack



◈   TOP PERFORMING AUTOMATION PROJECTS   ◈

🛡️ Enterprise-grade bots engineered for speed, reliability, and stealth  |  Multi-platform appointment domination


╔══════════════════════════════════════════════════════════╗
║            🌍   BLS INTERNATIONAL  NETWORK               ║
║         Automated Booking · Selfie Bypass · Queue Snipe  ║
╚══════════════════════════════════════════════════════════╝

🇲🇦   BLS Morocco Bot

Repo Featured Bypass

Fully automated BLS Morocco appointment engine with selfie bypass module — tackles biometric verification, handles queue logic, and fires booking requests at optimal timing windows.

🇵🇰   BLS Pakistan Bot

Repo Status Type

High-speed appointment sniper for BLS Pakistan. Built for stealth operation with rotating sessions, anti-detection layers, and real-time slot availability polling.

🇩🇿   BLS Algeria Bot

Repo Featured Bypass

Advanced Algeria BLS automation stack. Handles full booking flow + selfie bypass pipeline — engineered to cut through BLS Algeria's multi-step verification without friction.

🇲🇷   Mauritania BLS Bot

Repo Status Region

Specialized automation for BLS Mauritania appointments. Optimized for low-latency slot capture in high-demand booking windows with fallback retry logic.



╔══════════════════════════════════════════════════════════╗
║         🏛️   EMBASSY & CONSULATE AUTOMATION              ║
║       Italy · Germany · Turkey — Direct Portal Access    ║
╚══════════════════════════════════════════════════════════╝

🇮🇹   Prenotami Italy Bot

Repo Featured Target

Precision bot targeting Italy's official Prenotami embassy portal. Automates the full appointment reservation flow — login, slot polling, captcha handling, and confirmation capture.

🇩🇪   Germany Appointment Bot

Repo Status Type

Real-time appointment slot sniper for German consulate bookings. Monitors availability 24/7 and fires instant reservation requests the moment a slot opens up.



╔══════════════════════════════════════════════════════════╗
║          🌐   VFS GLOBAL & ALMAVIVA NETWORK              ║
║     Turkey · Global Portal · Almaviva — Full Coverage    ║
╚══════════════════════════════════════════════════════════╝

🇹🇷   VFS Turkey Bot

Repo Status Network

Targeted VFS Turkey appointment automation. Handles session management, CSRF tokens, and dynamic slot availability detection across VFS Turkey's booking infrastructure.

🌍   VFS Global Bot

Repo Featured Coverage

The flagship multi-region VFS Global automation engine. One bot, multiple embassies. Designed for cross-country slot hunting on the world's largest visa outsourcing platform.

🇮🇹   Almaviva Bot

Repo Status Type

Dedicated Almaviva visa center bot for Italian consulate networks. Automates booking workflows on one of Italy's primary appointment management systems.



⚡ 🏆“Repos Elite Best-Sellers for 2 Consecutive Years”🏆

# Bot Platform Highlight Link
01 BLS Morocco Bot BLS International Selfie Bypass → View Repo
02 BLS Pakistan Bot BLS International Slot Sniper → View Repo
03 BLS Algeria Bot BLS International Selfie Bypass → View Repo
04 Mauritania Bot BLS International Auto-Booking → View Repo
05 Prenotami Italy Bot Italy Embassy Portal Automation → View Repo
06 Germany Appointment Bot DE Consulate Real-Time Sniping → View Repo
07 VFS Turkey Bot VFS Global Session Management → View Repo
08 VFS Global Bot VFS Global Multi-Region → View Repo
09 Almaviva Bot Almaviva Italian Consulates → View Repo

🛠️   Tech Stack

Python Selenium Playwright Requests

Threading Proxy 2Captcha Telegram


Built with precision · Engineered for speed · Deployed for dominance

Profile




Typing SVG


Experience Focus Domain Approach



🛡️   Cybersecurity Research & Critical Systems Protection

Research ICS/OT

Research focus spans enterprise environments, industrial control systems (ICS/OT), and critical national infrastructure — with emphasis on understanding attacker tradecraft to build resilient, evidence-based defenses.

Primary Research Areas
─────────────────────────────────────────────────────────────────────
  ▸ Adversarial Simulation & Purple Team Operations
  ▸ Critical Infrastructure Attack Surfaces (ICS / SCADA / OT)
  ▸ Vulnerability Research — Zero-Day Triage & Responsible Disclosure
  ▸ Malware Behavioral Analysis & Reverse Engineering
  ▸ Supply Chain Security & Third-Party Risk Modeling

Key Principles:

  • Threat-informed defense over compliance-first security
  • Evidence-based risk prioritization using adversary intelligence
  • Continuous validation of defensive controls against real TTPs


🧠   Threat Intelligence & Defensive Security

MITRE ATT&CK TI

Operationalizing Cyber Threat Intelligence (CTI) — from raw indicator ingestion to finished intelligence products that drive defensive action. Analysis grounded in the MITRE ATT&CK framework with structured diamond model methodology.

Intelligence Collection

  • OSINT / HUMINT pipeline development
  • Threat actor profiling & campaign tracking
  • Dark web monitoring & data leak detection
  • IOC lifecycle management (creation → deprecation)

Intelligence Application

  • ATT&CK mapping & TTP-based detections
  • Threat hunting hypothesis development
  • Adversary emulation planning (MITRE Engage)
  • Strategic & tactical intelligence reporting
Intelligence Frameworks & Standards
─────────────────────────────────────────────────────────────────────
  MITRE ATT&CK  │  D3FEND  │  STIX/TAXII  │  OpenCTI
  Diamond Model │  Kill Chain  │  TIBER-EU  │  NIST CSF


🔐   Security Engineering & Architecture

Zero Trust Cloud

Designing and building security systems that are resilient by architecture — not bolted on as afterthought. Focused on defense-in-depth models that survive adversarial pressure, not just audit scrutiny.

Identity & Access

├── Zero Trust Architecture
├── PAM / Just-in-Time Access
├── MFA & Phishing-Resistant AuthN
├── Directory Hardening (AD/AAD)
└── OAuth2 / OIDC / SAML Flows

Network Security

├── Micro-Segmentation Design
├── Encrypted Traffic Analysis
├── East-West Traffic Inspection
├── DNS Security (RPZ / DoH/DoT)
└── BGP Hardening & DDoS Mitigation

Cloud & Infra

├── Cloud Security Posture Mgmt
├── Container & K8s Hardening
├── Immutable Infrastructure
├── Secrets Management (Vault)
└── IaC Security Scanning

AWS Azure GCP Kubernetes Terraform Vault



📡   Monitoring & Incident Response

SOC IR

Building detection capabilities that scale — from SIEM rule engineering to full SOC buildout. Incident response grounded in structured methodology, forensic integrity, and post-incident intelligence extraction.

Detection Engineering

  • SIEM architecture & rule development
  • Behavioral analytics & UEBA tuning
  • Threat hunting playbook construction
  • False positive reduction pipelines
  • Log source normalization & enrichment

Tooling

Splunk  │  Elastic SIEM  │  Microsoft Sentinel
Suricata  │  Zeek  │  Wazuh  │  Velociraptor

Incident Response

  • IR plan development & tabletop facilitation
  • Digital forensics — disk, memory, network
  • Ransomware containment & recovery
  • Threat actor eviction & re-hardening
  • Root cause analysis & lessons-learned reports

IR Lifecycle

Prepare → Identify → Contain
Eradicate → Recover → Review


⚙️   DevSecOps & Secure Development

Pipeline SDLC

Embedding security into the software delivery lifecycle — not as a gate, but as a continuous, automated capability. Security that moves at the speed of engineering.

Secure SDLC Pipeline
─────────────────────────────────────────────────────────────────────────────
  Code        →  Commit        →  Build         →  Test          →  Deploy
  ─────────      ───────────      ──────────       ──────────       ───────
  Threat        Pre-commit       SAST / SCA       DAST / IAST      Runtime
  Modeling      Hooks            Container        Fuzzing          Protection
  Secure        Secret           Image Scan       Pentest          CSPM
  Coding        Scanning         Signing          Compliance       Monitoring
  Standards                      SBOM Gen         Gate Check       Alerting

GitHub Actions SonarQube Snyk Trivy OWASP Semgrep



📚   Learning & References

Continuous Learning

Continuous learning is non-negotiable in security. Frameworks, communities, and resources that inform daily practice:

Frameworks & Standards

Resource Domain
MITRE ATT&CK Adversary TTPs
NIST CSF 2.0 Risk Framework
OWASP Application Security
CIS Controls Baseline Hardening
NIST SP 800-53 Control Catalog
D3FEND Defensive Techniques

Communities & Intelligence Feeds

Resource Type
CISA Advisories Threat Alerts
AlienVault OTX Open Threat Intel
Feedly Threat Intel RSS Intelligence
The DFIR Report IR Case Studies
VX-Underground Malware Research
Sans Internet Storm Daily Threat Diary

Certifications & Training Pathways

OSCP CISSP CEH GIAC SC-200 CKS



╔════════════════════════════════════════════════════════════════════════╗
║                                                                        ║
║   "Security is not a product you buy. It's a posture you maintain."   ║
║                                                                        ║
║    Know your adversary. Understand your terrain. Defend with intent.  ║
║                                                                        ║
╚════════════════════════════════════════════════════════════════════════╝

🦈 Shark Hacker | Cyber Security Specialist 🦈

Python JavaScript TypeScript C C++ Java Dart Go Ruby Swift React Flutter Node.js Angular Express.js Vue.js Git GitHub Docker Kubernetes Linux MySQL PostgreSQL VS Code Heroku

Popular repositories Loading

  1. BLS-Booking-Appointment-Bot BLS-Booking-Appointment-Bot Public

    An advanced automation system built to optimize visa appointment booking workflows for BLS International centers. Powered by intelligent request handling and real-time monitoring, the system maximi…

    Python 11 5

  2. Almaviva-Bot Almaviva-Bot Public

    A smart bot that auto-books Almaviva appointments in seconds—like Croatia work visa, Spain tourist (individual), and more. Instantly detects slots, books like a real user, and sends alerts via What…

    Python 9 2

  3. BLS-Algeria-Bot-Booking-Selfie-Bypass BLS-Algeria-Bot-Booking-Selfie-Bypass Public

    ⚙️ BLS Booking Bot – Algeria (With Selfie Bypass + Smart Extinction) Experience the fastest and most reliable BLS appointment booking bot for Algeria 🇩🇿. Our system uses advanced automation with Se…

    JavaScript 8 1

  4. Schengen-Bot Schengen-Bot Public

    ⭐⭐⭐⭐⭐ Shengen-Visa Bot A fast, smart automation tool that instantly books Schengen D visa appointments on official websites

    Dockerfile 5

  5. BLS-Morocco-Bot-Selfi-bypass- BLS-Morocco-Bot-Selfi-bypass- Public

    BLS Morocco Visa Appointment Smart Booking System | Automated Scheduling & User Verification Assistant

    Python 5 1

  6. Instagram-filter- Instagram-filter- Public

    🌈 Instagram Filters: What They Are Instagram filters are effects that modify how your photos or videos look. They can: Change colors (e.g., warmer, cooler, vintage tones) Add lighting or shadows Ap…

    4