Skip to content
View brunosergi's full-sized avatar

Block or report brunosergi

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
brunosergi/README.md

Bruno Sergio

Cyber Threat Intelligence Engineer | AI Automation | OSINT Investigator

LinkedIn GitBook HackTheBox

"Intelligence is not just data collection. It is the capability to anticipate the adversary."


🕵️‍♂️ /usr/bin/whoami

I am a Cyber Threat Intelligence Professional specializing in the intersection of OSINT, Dark Web Intelligence, and AI Automation.

My daily work involves tracking cybercrime ecosystems (Telegram, underground forums), mapping adversary behaviors to the MITRE ATT&CK framework, and automating the intelligence cycle. I build autonomous pipelines that collect, process, and analyze threat data at scale to improve proactive threat detection.

  • 🔭 Current Focus: Dark Web/Telegram Intelligence, Zero-Day/CVE Monitoring, and AI-assisted Threat Hunting.
  • 🧠 Philosophy: By understanding APT operations and the threat landscape, we can engineer high-fidelity detection rules (Sigma/Elastic) and stay ahead of adversaries.
  • 📚 Knowledge Base: I document my methodology, intelligence reports, and write-ups in my GitBook CTI Portfolio.

💻 Technology Stack & Tradecraft

I utilize a mix of detection engineering frameworks and automation tools to build CTI solutions.

⚡ Threat Detection & Engineering

Sigma MITRE Elasticsearch Python n8n Gemini

🛡️ Intelligence Collection & Analysis

OSINT DarkWeb Telegram


⚔️ Adversary Emulation & Offensive Mindset

While my professional role is focused on the Threat Intel, I am an offensive security enthusiast. Keeping hands-on with ethical hacking, Bug Bounty, and CTFs allows me to understand the hacker mindset. This is critical for APT emulation, testing our defenses, and understanding the real-world impact of adversaries.



"Defense without intelligence is just a firewall configuration. Defense with intelligence is strategy."

View All RepositoriesRead My CTF Writeups

Pinned Loading

  1. darkweb-forums-tracker darkweb-forums-tracker Public

    This is a darkweb forums tracker that monitors forum posts and sends alerts to Discord

    Dockerfile 5 2

  2. ai-scraping-kit ai-scraping-kit Public

    Complete self-hosted stack for building AI-powered web scraping automation with n8n, Playwright MCP, and Supabase

    PLpgSQL 2

  3. alive-url-scan alive-url-scan Public

    AI-powered URL threat analysis platform using n8n automation and Playwright MCP browser operator

    PLpgSQL 7 2

  4. ai-threat-intel-bulletin ai-threat-intel-bulletin Public

    Automated daily cybersecurity threat intelligence bulletins powered by AI. Monitors RSS feeds, analyzes threats with AI, and delivers professional summaries to Discord. Built with n8n workflows, Su…

    PLpgSQL 1 1

  5. bbhtd bbhtd Public

    25+ tools most used by bug bounty hunters, including GUI tools. Get a Docker container with all the tools you need for bug bounty, quickly and easily on any machine.

    Dockerfile 4 3

  6. self-hosted-n8n-template self-hosted-n8n-template Public

    A production-ready Docker template for running n8n in queue mode with Redis and PostgreSQL for scalable workflow automation.

    10 2