Skip to content
View m1thryn's full-sized avatar
🎯
Focusing
🎯
Focusing
  • Seattle, WA

Block or report m1thryn

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
m1thryn/README.md

Ian McKay

Security engineer focused on threat research, network detection engineering, vulnerability research, and threat intelligence tooling.

I build practical security tooling and research workflows for understanding adversary behavior, enriching indicators, validating detections, and turning technical findings into clear, actionable guidance.

Focus Areas

  • Threat intelligence and adversary TTP analysis
  • Network detection engineering and detection validation
  • Vulnerability and exploit behavior research
  • Active Directory abuse, credential access, and lateral movement
  • Malware behavior analysis and indicator enrichment
  • Python-based security tooling and automation

Projects

  • Radar: Passive intelligence enrichment CLI for IP addresses, domains, URLs, and file hashes.
  • Patchday: Terminal UI for browsing Microsoft Patch Tuesday CVEs and emitting enriched JSON for automation.

Current Interests

  • Detection quality, coverage analysis, and false-positive reduction
  • Practical workflows for vulnerability intelligence
  • Passive enrichment pipelines for security investigations
  • Mapping network behaviors to adversary techniques
  • Applying structured analysis to ambiguous security questions

Technical Background

  • Languages & Tools: Python, Bash, SQL, Git
  • Security Domains: Threat research, detection engineering, malware analysis, vulnerability research, incident response
  • Protocols & Platforms: DNS, SMB, Kerberos, LDAP, RPC, HTTP/S, AWS, Azure
  • Analysis Frameworks: MITRE ATT&CK, Diamond Model, Intelligence Cycle, threat modeling

Pinned Loading

  1. patchday patchday Public

    A TUI for browsing Microsoft Patch Tuesday CVEs

    Python

  2. radar radar Public

    An IoC enrichment CLI tool

    Python