I'm stronger with every line of code. Closer with every vulnerability. | ๐ก๏ธ CyberSecurity & Ethical Hacking
I'm a cybersecurity enthusiast with a passion for ethical hacking, digital defense, and finding vulnerabilities before the bad guys do.
With a strong commitment to safeguarding digital assets, I focus on understanding the tactics and techniques used by attackers in order to stay one step ahead.
My goal is to strengthen digital environments by anticipating and analyzing potential threats, ensuring systems remain resilient against evolving cyber attacks and emerging risks. I specialize in penetration testing, vulnerability assessment, malware analysis, and incident response, constantly refining my skills through hands-on experience and continuous learning.
Driven by curiosity and a proactive mindset, I actively participate in Capture The Flag (CTF) competitions, develop custom security challenges, and explore advanced topics such as reverse engineering and exploit development. I believe that true cybersecurity is a continuous process of learning, adapting, and innovating to protect our increasingly connected world.
- ๐ Exploring and experimenting with diverse network systems and security tools
- ๐ Conducting thorough penetration testing in Web, Network, and Wireless environments
- ๐ฆ Diving deep into malware analysis, reverse engineering, and unpacking complex binaries
- ๐ฏ Solving and creating Capture The Flag (CTF) challenges to enhance cybersecurity skills
- ๐ต๏ธ Leveraging OSINT techniques and performing digital forensic investigations for threat intelligence
- ๐ฆ Developing secure and efficient systems using the Rust programming language
- ๐ ๏ธ Designing, building, and deploying custom CTF challenges to educate and challenge others
- ๐ฅ Crafting advanced custom payloads, writing exploits, and developing proof-of-concept attacks
- ๐ก Setting up and managing enterprise-grade network labs involving Cisco switches, routing, and VLANs
- ๐ Practicing secure coding, auditing, and vulnerability assessments in Rust, Python, Bash, and C
- ๐ Analyzing network traffic with tools like Wireshark and creating custom packet manipulations with Scapy
- ๐ณ Exploring container security with Docker and Kubernetes for modern cloud-native environments
- โ๏ธ Understanding cloud security principles across platforms like AWS, Azure, and Google Cloud
- ๐ค Automating penetration testing and security workflows through scripting and tool development
- ๐๏ธ Hands-on experience in managing databases and implementing security best practices to maintain data integrity. Skilled in configuring, maintaining and securing databases to ensure high availability and data protection
- โกI'm passionate about Electrical and Electronics Engineering, focusing on circuit design, sensor systems, and microcontrollers like Arduino and STM32. I enjoy building embedded and IoT projects while constantly learning and improving.
- ๐ Exploring and experimenting with diverse network systems and security tools
- ๐ฆ Learning Rust to build secure systems
- ๐ฏ Creating my own CTF challenges
- ๐ฅ Writing custom payloads and exploits
- ๐ง Setting up and experimenting with Cisco switches and routers
- ๐ข๏ธ Exploring database management and secure configurations
I'm always experimenting, breaking, fixing, and learning.
- ๐ฆ Rust for secure and efficient system programming
- ๐ง Advanced Cisco networking concepts (Switching, Routing, VLANs, ACLs, QoS)
- ๐๏ธ Database management systems and best security practices (MySQL, PostgreSQL, MongoDB)
- ๐ฅ Writing custom exploits, payloads, and advanced proof-of-concept attacks
- ๐ฏ Designing and deploying custom CTF challenges for different skill levels
- ๐ Reverse engineering techniques, malware unpacking, and dynamic analysis
- ๐ต๏ธ Threat hunting methodologies and incident response automation
- ๐ฐ๏ธ OSINT (Open Source Intelligence) tools and techniques
- ๐งโ๐ป Digital forensics and log analysis for cyber incident investigations
- ๐ณ Container security and orchestration with Docker and Kubernetes
- โ๏ธ Cloud security fundamentals (AWS, Azure, GCP)
- ๐ Secure coding practices in Rust, Python, Bash, and C
- ๐ค Automation and scripting for penetration testing (Python, PowerShell, Bash)
- ๐ก Network protocol analysis and packet crafting (Wireshark, Scapy)
- ๐ Web application security, including modern frameworks and APIs
- ๐ถ Wireless security and penetration testing techniques
- ๐ Cryptography basics and practical applications in security
- ๐งฐ Building and using custom security tools and red team utilities
- ๐ฎ Continuous learning through CTF competitions and collaborative projects
- ๐ง Developing skills in social engineering and human factor analysis
- ๐ฌ Flipper Zero โ Experimenting with RF, IR, RFID, and more
- ๐ Raspberry Pi โ DIY projects and edge computing
- ๐ฆ USB Rubber Ducky โ Scripting and testing HID attacks (for ethical purposes only)
- ๐ YubiKey โ Hardware authentication token for secure login and 2FA
- ๐ก HackRF One โ Software-defined radio (SDR) for analyzing wireless signals
- ๐ ๏ธ Proxmark3 RDV4 โ Advanced RFID/NFC research tool for reading/cloning tags
- ๐ LAN Turtle โ Covert network implant for remote access and sniffing
- ๐ Packet Squirrel โ USB-powered device for packet capture and MITM attacks
- ๐งฒ Key Grabber โ Hardware keylogger (used for testing physical endpoint security)
- ๐ USB Kill โ Tests surge protection by delivering high-voltage pulses to USB ports
- ๐๏ธ WiFi Pineapple โ Wireless auditing device for rogue AP detection and testing
- And More...
- ๐งฉ We are I am open to collaboration on designing and developing secure Microsoft SQL Server databases to support the creation, deployment, and scoring of both .
- ๐ ๏ธ Designing and hosting CTF challenges (Jeopardy & Attack-Defense style)
- ๐ Real-world penetration testing scenarios (Web, Network, Wireless)
- ๐งฌ Malware analysis, unpacking, and reverse engineering
- ๐ฐ๏ธ Threat hunting, OSINT, and digital forensics investigations
- ๐ก Building and simulating enterprise-grade network labs (Cisco, VLANs, Routing, Firewalls)
- ๐งช Developing custom exploits, payloads, and proof-of-concept attacks
- ๐ Secure coding and auditing in Rust, Python, and Bash
- ๐งฐ Contributing to open-source cybersecurity tools and red team utilities