Skip to content
View kaimi-'s full-sized avatar

Organizations

@kaimi-io

Block or report kaimi-

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
kaimi-/README.md

I'm Sergey “Kaimi” Belov, a cybersecurity engineer and team lead focused on application security, penetration testing and security architecture for enterprise systems. I spend most of my time helping companies understand how they can actually be hacked - and then making sure it's me who does it first 🛡️🐞

On the technical side, my background is a mix of low-level development and offensive security. Over the last decade I've led and built security teams in banking, fintech, AI platforms, and Big4 consulting, doing everything from classic penetration testing and reverse engineering to SSDLC, threat modeling, and large-scale vulnerability assessments. I've worked across stacks and environments, from ATMs and payment systems to cloud infrastructure and developer tooling, and I still enjoy getting my hands dirty with Burp, IDA, nmap, and a good hex editor 🧩

Outside of work I'm active in bug bounty programs and CTFs (not much in past few years) - hunting bugs in major platforms, earning a few Hall of Fame mentions along the way, and continuously sharpening my offensive skills. When I publish something (here or on my and d_x blog at kaimi.io), it's usually tooling, PoCs, and small experiments around application security, infrastructure hardening, and automation 💻 You can also find my commentary on cybercrime, financial fraud and digital risks in various media and industry outlets.

If you're interested in collaboration, security reviews or just want to discuss weird bugs and interesting exploits, reach me out via contacts on belov.expert / kaimi.io

Pinned Loading

  1. jsp-server-manager jsp-server-manager Public

    A lightweight, single-file web-based server management interface built with JSP. Provides file management, command execution, and system monitoring capabilities with optional end-to-end encryption.

    Java 2

  2. kaimi-io/web-fuzz-wordlists kaimi-io/web-fuzz-wordlists Public

    Common Web Managers Fuzz Wordlists

    175 43

  3. Possible IP Bypass HTTP Headers Possible IP Bypass HTTP Headers
    1
    CACHE_INFO: 127.0.0.1
    2
    CF_CONNECTING_IP: 127.0.0.1
    3
    CF-Connecting-IP: 127.0.0.1
    4
    CLIENT_IP: 127.0.0.1
    5
    Client-IP: 127.0.0.1
  4. kaimi-io/cpp-injector-class kaimi-io/cpp-injector-class Public

    C++ Code Injector Class

    C++ 22 5

  5. kaimi-io/yandex-music-download kaimi-io/yandex-music-download Public archive

    Yandex Music Downloader

    Perl 268 33