$ whoami
Cybersecurity Analyst | Pentester | Red Teamer
> Initializing portfolio protocols...
> Loading security modules... DONE
> Accessing secure mainframe...
"Security is not a product, but a process."
I am a security practitioner dedicated to hardening systems and understanding attacker methodologies. My journey began with simple script kiddie curiosity and evolved into a professional passion for Ethical Hacking and Network Defense.
Currently, I focus on web application security, conducting vulnerability assessments, and automating threat detection. I believe in responsible disclosure and continuous learning in this rapidly evolving landscape.
When I'm not auditing code or analyzing pcap files, I'm participating in CTFs (Capture The Flags) or contributing to open-source security tools.
A heuristic-based analysis tool written in Python to detect potential keylogging processes running in the background. Analyzes hook chains and API calls.
Deployed a T-Pot honeypot on a Raspberry Pi to monitor SSH brute force attacks. Visualized attacker geolocation data using ELK Stack.
Detailed documentation of exploitation paths for retired HTB machines including 'Legacy', 'Blue', and 'Devel'. Focus on methodology.
My inbox is always open. Whether you have a question about a vulnerability, want to discuss a project, or just want to say hi, I'll try my best to get back to you.
PGP FINGERPRINT
Click to Copy