01 Who am I
Mi nombre es Luis Diago de Aguilar, analista senior de ciberseguridad e ingeniero de software operando bajo el pseudónimo h3st4k3r. Mi trayectoria se centra en la convergencia entre la inteligencia artificial aplicada y la ciberseguridad defensiva.
He consolidado mi especialización técnica en la orquestación de sistemas complejos, integrando arquitecturas de Inteligencia Artificial para la optimización de procesos y el Análisis de Inteligencia para la prevención proactiva. Mi praxis profesional se fundamenta en la investigación de vulnerabilidades y en la construcción de soluciones de software robustas bajo estándares de alta disponibilidad.
24
Repositorios
61
Artículos
142
Contribs
5
Ponencias
Gestión del ciclo de vida de vulnerabilidades y respuesta a incidentes (Junior Incident Response). Análisis de alertas, clasificación de severidad y remediación técnica.
Generación de inteligencia de amenazas mediante monitorización OSINT y Deep Web. Análisis de TTPs de actores de amenaza y enriquecimiento de IOCs.
Automatización de flujos de trabajo de seguridad mediante scripts personalizados e integración de APIs de terceros con plataformas de gestión.
Diseño e implementación de modelos de aprendizaje automático orientados a la detección de anomalías y automatización cognitiva en entornos SOC.
03 Alerta Vulnerabilidades
The Riaxe Product Customizer plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 2.1.2. The plugin registers an unauthenticated AJAX action ('wp_ajax_nopriv_install-imprint') ...
MailGates/MailAudit developed by Openfind has a Stack-based Buffer Overflow vulnerability, allowing unauthenticated remote attackers to control the program's execution flow and execute arbitrary code....
Creolabs Gravity before 0.9.6 contains a heap buffer overflow vulnerability in the gravity_vm_exec function that allows attackers to write out-of-bounds memory by crafting scripts with many string literals at global scop...
The Barcode Scanner (+Mobile App) – Inventory manager, Order fulfillment system, POS (Point of Sale) plugin for WordPress is vulnerable to privilege escalation via insecure token-based authentication in all versions up t...
A flaw was found in ArgoCD Image Updater. This vulnerability allows an attacker, with permissions to create or modify an ImageUpdater resource in a multi-tenant environment, to bypass namespace boundaries. By exploiting ...
A vulnerability in Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected device. To exploit this vulnerability,...
A vulnerability in the integration of single sign-on (SSO) with Control Hub in Cisco Webex Services could have allowed an unauthenticated, remote attacker to impersonate any user within the service. This vulnerability...
A vulnerability in Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected device. To exploit this vulnerability,...
A vulnerability in Cisco ISE and Cisco ISE-PIC could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected device. To exploit this vulnerability, the atta...
The Visa Acceptance Solutions plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 2.1.0. This is due to the `express_pay_product_page_pay_for_order()` function logging users ...