Your Photo

Hi, I am Leonard

leonardmelnik@pm.me

Cybersecurity enthusiast and software developer...

Projects

Unime.io logo
Screenshot of Unime.io
Unime.io

A free tool that displays official Professor evaluation surveys in a comprehensive and concise manner. Initial version had over 10k unique visitors.

215 Registered Users

BreachByte

Screenshot of BreachByte
BreachByte

Digestible Threat Intelligence. Free and open tool to view latest breaches.

10,000 Breached Entities
Evaluable logo

Evaluable

Screenshot of Evaluable
Evaluable

Advanced multi-variate surveying platform currently implemented in several latin-american companies.

1,700 Survey Submissions

SimpleStatus

Screenshot of SimpleStatus
SimpleStatus

Super basic platform to allow monitoring of processes/scripts/and more

Watchdog.ID logo

Watchdog

Screenshot of Watchdog.ID
Watchdog.ID

Individual, Family, and Corperate credential monitoring and remediation platform

9 Billion+ Credentials
Watchdog Extension logo

Watchdog (Web Ext)

Screenshot of Watchdog Extension
Watchdog Extension

Individual, Family, and Corperate credential monitoring and remediation platform

9 Billion+ Credentials
Enigma logo

Enigma

Screenshot of Enigma
Enigma

Advanced multi-variate surveying platform currently implemented in several latin-american companies.

20 Downloads
ThreatRecord logo

ThreatRecord

Screenshot of ThreatRecord
ThreatRecord

Threat Intelligence platform. Custom Dashboards, Analytics, Alerting with advanced filtering.

10,000 Breached Entities

Certifications

A showcase of my certifications and qualifications in various domains.

Certification Icon

Microsoft Certifications

  • Power BI Data Analyst Associate
  • Azure AI Fundamentals
Certification Icon

Stripe Certified Professional Developer

Certification Icon

Kusto Detective Gold Star

Certification Icon

Qualys Certifications

  • CyberSecurity Asset Management (CSAM)
  • Web Application Scanning
  • Vulnerability Management Detection & Response
Certification Icon

Hubspot Certifications

  • Sales Software
  • Inbound
  • Frictionless Sales
  • Revenue Operations
Certification Icon

CSI Linux Certified Investigator

Articles/Blogs

Some articles or posts I have written about my work as well as hobbies.

Web/Security Compliance

Discussed the criticality of web scanning in preventing data breaches and its impact on reducing escalating costs related to security failures.

CybersecurityData ProtectionWeb Scanning
Digital Forensics

Outlines the methods by which credentials are compromised, including database breaches, malware, and phishing, and discusses how digital forensics and law enforcement can acquire these credentials for investigation. The paper highlights the benefits and challenges of using stolen credentials in forensics.

CybersecurityDigital ForensicsStolen Credentials
Threat Intelligence

I explore the vulnerability of small businesses to cyber threats and the importance of threat intelligence in mitigating these risks.

CybersecurityThreat IntelligenceSmall Buisness
Ethical hacking

This is an older blog post of mine where I used an arduino to run a payload on Windows and Mac machines with persistence.

Ethical HackingScripting