Skip to content
View twux-sec's full-sized avatar
  • France

Block or report twux-sec

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
twux-sec/README.md

Twux

Breaking and building since my early teens (web security, network exploration). Career path took me through finance, compliance and business management — four years in regulated finance (wealth management, LCB-FT compliance, business management). Full-time back on technical security work since late 2025 — active CTF practice, building open-source investigative tools, deepening methodology. Now with a thorough understanding of financial flows, risk and regulatory frameworks.

Working on · sec-notes · usertrail · sanctioncheck · corprecon

Focus · OSINT · Financial Investigation · Threat Intelligence

Core Tools · Python · Linux · Maltego · Shodan · Spiderfoot · Recon-ng · Sherlock · Wireshark

Learning · Splunk · Malware analysis

Certifications · Trace Labs OSINT Educational Series · F1NDX OSINT Levels 1-3 · EBIOS Risk Manager — introduction (ANSSI, 2026)

CTF rankings (active since late 2025)

  • Osintopia
  • OSINT Industries CTF — Rank 19 / 2300
  • CTF Bleuet de France V5 (AEGE, mai 2026) — 100% · solo · 36eme/220 équipes
  • Trace Labs Search Party CTF - En cours
  • Root-Me · TryHackMe · HackTheBox

Contact · Available on request


How I work

OSINT investigation starts with a clear methodology before touching any tool. I follow a structured collection → validation → enrichment workflow, document everything in Obsidian, and publish writeups on sec-notes.

Financial background feeds directly into FININT work: reading corporate structures, tracing beneficial ownership, cross-referencing sanctions lists — things I did professionally for four years under LCB-FT compliance.


Designed by @twux-sec.

Pinned Loading

  1. corprecon corprecon Public

    OSINT tool to map French corporate mandate networks (INSEE SIRENE, BODACC, Pappers)

    Python

  2. dorkator dorkator Public

    OSINT dork generator for authorized reconnaissance — 84 curated dorks, batch opener, HTML/MD/JSON reports.

    Python

  3. usertrail usertrail Public

    OSINT username reconnaissance across European & French platforms

    Python

  4. twux-sec twux-sec Public

  5. sanctioncheck sanctioncheck Public

    CLI screening tool for international sanctions lists (EU, UN, OFAC, DGT)

    Python 1