Skip to content
View extencil's full-sized avatar

Highlights

  • Pro

Organizations

@haltman-io

Block or report extencil

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
extencil/README.md

I'm extencil. Brazilian. Security researcher, infrastructure builder.

WHERE TO FIND ME

If I don't reply to you via emails, I'm dead

Featured Project

A free mail forwarding service. Around 50 domains. No logs. No alias caps. No freemium theater. Unlicense, open source, auditable end to end. Phrack, team-teso/THC, eurocompton, antisec and others route aliases through it.

I ethically hacked

  • 2026, iq.thc.orgiq.thc.org (Hall of Fame)
  • 2026, dns2tcp-gatewayohmymex/dns2tcp-gateway (Hall of Fame)
  • 2025, KlarnaHackerOne Report (Hall of Fame)
  • 2024, NASA — Confidential
  • 2024, QualitorCVE-2024-44849
  • 2023, segfault.nethackerschoice/segfault (Hall of Fame)
  • 2021, LinkedIn — spam delivered through LinkedIn's own SMTP, Premium or not.
  • 2021, Brazilian Army enlistment portal — session takeover on Gov.br-connected accounts. Password optional.
  • 2021, Enem / INEP — source disclosure plus unauthenticated pivots against government-hosted apps, bypassing the expected proxy path.
  • OpenBugBounty quality badge for reports on 10+ named public sites.

WHAT I DO

  • network edge hardening
  • email infrastructure and alias flows — abuse surfaces, counter logic, policy
  • deployment and service reliability with predictable failure modes
  • defensive automation for public-facing systems
  • proxy and routing layers with explicit trust boundaries
  • developer tooling that cuts repetitive operator work

Pinned Loading

  1. CVE-2024-44849 CVE-2024-44849 Public archive

    🔥 CVE-2024-44849 Exploit

    Shell 5

  2. haltman-io/ip-thc haltman-io/ip-thc Public

    A CLI tool written in Golang to perform queries on over 5.14 billion mapped assets in The Hackers' Choice datasets (https://ip.thc.org/). Supports Reverse DNS, Subdomain, and CNAME queries.

    Go 6

  3. haltman-io/mail-forwarding haltman-io/mail-forwarding Public

    🔥 Simple, fast, secure, and abuse-aware open-source mail forwarding stack. Trusted by Phrack, THC, Team-Teso, EuroCompton, AntiSec and others!

    Perl 8 2

  4. haltman-io/mail-forwarding-ui haltman-io/mail-forwarding-ui Public

    A beauty theme for our mail forwarder server

    TypeScript 4