About Me

I am a cybersecurity professional passionate about ethical hacking, penetration testing, and sharing knowledge with the security community. This blog serves as both my learning journal and portfolio showcasing my work in the field.

Skills & Expertise

Core Competencies

  • Penetration Testing - Web applications, network infrastructure, mobile applications
  • Vulnerability Assessment - Identifying and prioritizing security risks
  • CTF Participation - Active player and writeup creator
  • Security Research - Threat analysis and vulnerability research
  • Incident Response - Detection, analysis, and remediation

Technical Skills

Penetration Testing

  • Web Application Testing (OWASP Top 10)
  • Network Penetration Testing
  • Wireless Security Assessment
  • Social Engineering
  • Post-Exploitation Techniques

Tools & Frameworks

  • Network Scanning: Nmap, Masscan, Rustscan
  • Web Testing: Burp Suite, OWASP ZAP, SQLmap
  • Exploitation: Metasploit, Cobalt Strike, Custom Payloads
  • OSINT: theHarvester, Recon-ng, Maltego
  • Password Attacks: Hashcat, John the Ripper
  • Reverse Engineering: Ghidra, IDA Pro, Radare2
  • Forensics: Volatility, Autopsy, Wireshark

Platforms & Certifications

  • CTF Platforms: HackTheBox, TryHackMe, picoCTF, OverTheWire
  • Certifications: CEH, OSCP, GPEN (update with your actual certs)
  • Specializations: Web Application Security, Network Security, Red Team Operations

Here are some of my notable CTF and security research writeups:

ChallengePlatformDifficultyTags
Challenge NameHackTheBoxMediumWeb, SQL Injection
Challenge NameTryHackMeEasyLinux, Privilege Escalation
Challenge NamepicoCTFHardReverse Engineering

Full list available on the Posts page

Contact

Connect with me on professional platforms:

For collaboration, penetration testing engagements, or security research discussions, feel free to reach out via email at your.email@example.com

Disclaimer

All content published on this blog is for educational purposes only. The techniques and methodologies shared should only be used in authorized testing environments with proper permission. I do not condone the use of these techniques for malicious purposes.