I am a passionate Cybersecurity Engineer and Ethical Hacker who thrives on breaking systems (legally) to make them stronger.
My main expertise lies in penetration testing, reverse engineering, and digital forensics. I enjoy challenging myself with complex problems and continuously learning cutting-edge technologies in the field of cybersecurity.
- Currently working on: Advanced C2 Frameworks, Honeypots, and Secure Tunnel Protocols
- Currently learning: Kernel-level programming in C & advanced malware analysis
- Motto: Hack to Protect, Secure to Win!
- Goal: To make the digital world safer through secure development and ethical hacking.
Here are the tools, languages, and platforms I use to research, test, and secure systems:
-
Operating Systems
- Custom OS but Based on Debian
- Windows
- Debian Addictโ๏ธ
-
Programming Languages
- Python
- Bash
- C
-
Security & Analysis Tools
- Nmap
- Wireshark
- Metasploit Framework
- Burp Suite
- John the Ripper / Hashcat
- OpenVAS
- IDA / Ghidra
-
Focus Areas
- Penetration Testing
- Vulnerability Assessment
- Exploit Development
- Digital Forensics
- Incident Response
Here are some of the key projects I've built and maintained:
- Simple C2 SSH โ Lightweight command & control framework over SSH with user authentication & custom shell
- HoneyFTP โ Honeypot FTP server designed to deceive and log attackers
- ShadowTunnel โ Covert tunneling protocol with encrypted authentication
- Advanced exploit development and buffer overflows
- Malware reverse engineering and obfuscation techniques
- Secure protocol design at the kernel/network layer
- Red Team vs Blue Team simulation environments
๐ **"Hack the planet, but make it safer."** ๐