xen 

Miami, Florida, United States
email-iconphone-icongithub-logolinkedin-logotwitter-logostackoverflow-logofacebook-logo
Join Prog.AI to see contacts
email-iconphone-icongithub-logolinkedin-logotwitter-logostackoverflow-logofacebook-logo
Join Prog.AI to see contacts

Summary

🤩
Rockstar
award
Top expert inCross-Platform Social Media & Messaging Automation
Cody Zacharias is a cybersecurity engineer and founder with nine years of experience focused on mobile and web application security, secure code review, penetration testing, and exploit and tool development. He has worked on HackerOne’s triage team, served as a Security Engineer at Hyperproof, and now runs SupplyShark to help organizations identify and remediate supply chain vulnerabilities. An independent researcher and active open-source contributor, Cody built core functionality for notable tools like the Go subdomain-takeover scanner subjack and contributed major Python 3 refactors and scraping features to twint, alongside publicly released exploits on Exploit-DB. He treats vulnerability research as a creative craft, mentors other engineers, and pairs deep offensive curiosity with practical, remediation-focused guidance.
code9 years of coding experience
github-logo-circle

Github Skills (25)

json10
python10
bash10
beautifulsoup10
security10
go10
web-scraping10
aiohttp10
scripting9
infosec9
bugtracker9
bug-reporting9
bug-tracking9
golang9
pentest9

Programming languages (2)

GoPython

Github contributions (5)

github-logo-circle
haccer/subjack

Oct 2017 - Nov 2020

Subdomain Takeover tool written in Go
Role in this project:
userBack-end & Security Engineer
Contributions:8 releases, 170 commits, 12 PRs in 3 years 1 month
Contributions summary:Xen primarily contributed to the development of the core functionality of the subdomain takeover tool. Their commits include the creation and updates to shell scripts used for subdomain enumeration and CNAME record lookup, and the creation of the primary tool `subjack.go`. The user also made improvements such as removing color and added CloudFront checks, as well as added a JSON output option. This indicates a focus on both functionality and identifying potential security vulnerabilities.
golangbugbountysecurityinfosecgo
twintproject/twint

Jun 2017 - Mar 2021

An advanced Twitter scraping & OSINT tool written in Python that doesn't use Twitter's API, allowing you to scrape a user's followers, following, Tweets and more while evading most API limitations.
Role in this project:
userBack-end Developer
Contributions:4 releases, 592 commits, 33 PRs in 3 years 9 months
Contributions summary:Xen primarily contributed to the development of the `tweep.py` script, which appears to be the core functionality of the project. They implemented and updated features related to web scraping Twitter, including URL generation, feed retrieval, and tweet parsing. The user added functionalities like filtering tweets based on criteria, saving images, and saving output to CSV files. Additionally, they refactored the code for Python 3 compatibility.
pythonapi-skibanascrapingosint
Find and Hire Top DevelopersWe’ve analyzed the programming source code of over 60 million software developers on GitHub and scored them by 50,000 skills. Sign-up on Prog,AI to search for software developers.
Request Free Trial