Skip to content
View bashfarelos's full-sized avatar
👁️
👁️
  • Agência Compor
  • Ribeirão Preto, Brazil
  • 05:37 (UTC -03:00)
  • LinkedIn in/cauefaleiros

Highlights

  • Pro

Block or report bashfarelos

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
bashfarelos/README.md

Hey There! 👋

I am a Software Development Intern at Agência Compor, acting as a Full-stack Developer with a focus on infrastructure and high-availability systems.

>_ What I do at Compor

  • Full-stack Development: Building Multi-Tenant apps and CRM systems from frontend to business logic.
  • Architecture: Designing database schemas and orchestrating AI agents for smarter workflows.
  • Infrastructure: Managing the full deployment lifecycle, including CI/CD pipelines and Docker Swarm.
  • Reliability: Configuring Nginx reverse proxies and DNS zones to ensure scalable and secure environments.

>_ Beyond the Office

Currently, I spend my free time diving into Reverse Engineering and Malware Analysis. It’s a personal deep-dive driven by a curiosity for low-level software behavior and security.


>_ Tech Stack

// Languages

// Backend

// Frontend

// DevOps & Observability

// Tools & OS


>_ Currently Reading

Low-Level Programming cover Low-Level Programming: C, Assembly, and Program Execution on Intel® 64 Architecture
by Igor Zhirkov

Explores the bridge between high-level code and hardware. This book covers modern Intel 64 architecture, assembly language, and C, with a deep dive into compilation processes, memory management, and performance optimization.
Practical Malware Analysis cover Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
by Michael Sikorski and Andrew Honig

The "bible" of malware analysis. It provides a comprehensive, hands-on approach to dissecting malicious binaries using static and dynamic analysis, debugging, and reverse engineering to understand attacker's motives and techniques.

>_ Connect with Me

Pinned Loading

  1. bookshelf-api bookshelf-api Public

    API for book management using FastAPI

    Python

  2. todo-list todo-list Public

    a todo list API built with java, spring boot, and postgreSQL, featuring full CRUD functionality for task management

    Java

  3. color-motion-control color-motion-control Public

    a color-based motion control system for playing video games using OpenCV

    Python

  4. go-learning go-learning Public

    im learning go with "learn go with tests" website

    Go