Skip to content
View kaimi-'s full-sized avatar

Organizations

@kaimi-io

Block or report kaimi-

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
kaimi-/README.md
Sergey Kaimi Belov — application security, offensive research, banking systems Typing SVG

> root@enterprise:~# whoami

I’m Sergey “Kaimi” Belov — a cybersecurity engineer and team lead focused on application security, penetration testing, and security architecture for enterprise and financial systems.

Most of my work is about helping companies understand how they can actually be hacked — and then making sure it is me who does it first.

My background sits somewhere between low-level development and offensive security: banking, fintech, AI platforms, Big4 consulting, ATMs, payment flows, cloud infrastructure, developer tooling, reverse engineering, SSDLC, threat modeling, and large-scale vulnerability assessments.

┌─[kaimi@belov.expert]─[~/ops]
└──╼ ./profile --brief

[+] role       : security engineer / team lead
[+] focus      : appsec, pentest, architecture
[+] terrain    : banking, fintech, enterprise
[+] mindset    : offensive, practical, result-first
[+] tools      : Burp, IDA, nmap, hex editor
[+] output     : bugs, PoCs, tooling, risk maps, articles

Surface

🔴 Application Security

Web, API, mobile-adjacent and enterprise application security: from classic penetration testing to security reviews, SSDLC, threat modeling, and vulnerability management.

🏦 Banking & Fintech

Financial applications, payment systems, ATMs, remote banking, fraud scenarios, business logic, integration flows, and the kind of bugs that do not look scary until money starts moving.

🧬 Low-level & Offensive

Reverse engineering, exploit research, infrastructure hardening, CTF/bug bounty background, weird protocol behavior, and occasional late-night experiments with things that should not parse like that.


Signal

> I like security work that produces something concrete:
  a reproducible exploit, a working PoC, a clear risk map,
  a hardened configuration, a fixed architecture, or a painful
  business-risk conversation that should have happened earlier.
  • Built and led security teams across banking, fintech, AI platforms, and consulting.
  • Worked with systems ranging from ATMs and payment environments to cloud infrastructure and developer tooling.
  • Still enjoy getting hands-on with Burp Suite, IDA, nmap, logs, traces, packet dumps, and a good hex editor.
  • Active around bug bounty and CTF culture, with a few Hall of Fame mentions along the way.
  • Publish tooling, PoCs, security notes, and experiments on GitHub and on the joint blog with d_x at kaimi.io.
  • Occasionally comment in media on cybercrime, financial fraud, digital risks, and the practical side of defensive security.

Things I tend to ship

/ research notes       / small security tools
/ PoCs                 / infrastructure experiments
/ hardening snippets   / appsec automation
/ reverse engineering  / writeups from strange corners
/ threat models        / security architecture notes
GitHub stats Snake

Collaboration

I’m usually interested in work where security is treated as an engineering and business problem, not a ritual exercise.

Good reasons to reach out:

  • security review of an application, platform, or critical business flow;
  • penetration testing with realistic attack scenarios and practical remediation;
  • threat modeling and security architecture for enterprise systems;
  • banking, fintech, payment, fraud, or high-risk application security questions;
  • weird bugs, exploit ideas, research notes, or tools worth building.
result != "list of vulnerabilities"
result == "clear attack paths + business impact + prioritized fixes"

Contacts

LinkedIn X / Twitter Telegram Instagram Blog


Pinned Loading

  1. jsp-server-manager jsp-server-manager Public

    A lightweight, single-file web-based server management interface built with JSP. Provides file management, command execution, and system monitoring capabilities with optional end-to-end encryption.

    Java 2

  2. java-paths java-paths Public

    Possible paths for Java-specific path traversal, etc.

    8 3

  3. kaimi-io/web-fuzz-wordlists kaimi-io/web-fuzz-wordlists Public

    Common Web Managers Fuzz Wordlists

    177 42

  4. Possible IP Bypass HTTP Headers Possible IP Bypass HTTP Headers
    1
    CACHE_INFO: 127.0.0.1
    2
    CF_CONNECTING_IP: 127.0.0.1
    3
    CF-Connecting-IP: 127.0.0.1
    4
    CLIENT_IP: 127.0.0.1
    5
    Client-IP: 127.0.0.1
  5. kaimi-io/yandex-music-download kaimi-io/yandex-music-download Public

    Yandex Music Downloader

    Perl 270 33

  6. qidi-q2-remote qidi-q2-remote Public

    Remote touchscreen emulation for QIDI Q2

    C