Skip to content
View alexcosta97's full-sized avatar

Block or report alexcosta97

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
alexcosta97/README.md

Hi 👋, I'm Alex

I'm a Software Engineer with a focus on back-end development using Node.js

I can also develop front-end (Angular/React) or mobile applications (iOS)


🔭 I'm currently working on:

  • A script to automate the setup of a new laptop (down to OS settings) - will make it public soon bash
  • nodejs-http-errors, a Node.js package containing HTTP Errors ready to throw javascript
  • danger-plugin-pr-utilities, a plugin for Danger JS, containing utilities to validate PRs - just started work on it and planning the project typescript

🌱 I’m currently learning about Penetration Testing and how to better secure applications

🎮 I like to speedrun video games and can sometimes be found on Twitch

📫 Email: [email protected]

📫 Twitter: @c0axial97

⚡ Fun fact: I have a Spotify playlist with over 10K likes

Blogs posts

Pinned Loading

  1. nodejs-http-errors nodejs-http-errors Public

    Throwable HTTP Errors for Node.js

    JavaScript

  2. danger-plugin-pr-utilities danger-plugin-pr-utilities Public

    JavaScript

  3. CVE-2019-9053 CVE-2019-9053
    1
    #!/usr/bin/env python
    2
    # Exploit Title: Unauthenticated SQL Injection on CMS Made Simple <= 2.2.9
    3
    # Date: 30-03-2019
    4
    # Exploit Author: Daniele Scanu @ Certimeter Group
    5
    # Vendor Homepage: https://www.cmsmadesimple.org/