About me

Harnessing a commitment to relentless self-learning, I possess expertise in both offensive and defensive cybersecurity operations. My curiosity fuels a creative approach to defending digital environments, where I translate complex concepts into actionable insights to enhance organizational security. Passionate about empowering teams and fostering a culture of security awareness, I strive to contribute to a safer digital landscape.

Beyond cybersecurity, I am a multifaceted individual with a thirst for knowledge. My interests include chess, music, reading diverse books, philosophy, and meditation. As an INTJ-T personality type, I thrive on deep thinking and introspection, constantly seeking to expand my understanding of the world.

02+

Years of
Experience

03+

Years of Self Learning Experience

08+

Certifications
Earned

24+

CTF's
Participated

Portfolio

What I'm Doing

  • Freelance Security Services Icon

    Freelance Security Researcher

    Providing various security services including Article Writing, Vulnerable Lab Making, Training, Pentesting, and Vulnerability Assessments on a freelance basis.

  • Security Content Creation Icon

    Security Content Creation

    I conduct research on various security vulnerabilities and exploits, and I create blogs and vulnerable machines based on my findings to help new security professionals learn about different techniques.

  • Cybersecurity Learning Icon

    Self Learning

    Continuously learning and practicing both offensive and defensive techniques to grow as a hacker. Practicing both offensive and defensive techniques is going to give me both attacker's and defender's perspective.

  • Chess Strategy Icon

    Chess

    I am committed to mastering chess, as it is a game that has been shown to improve a wide range of soft skills, such as stress management, critical thinking, and problem-solving.

Awareness

Enhancing Your Online Safety

Stay informed about essential cybersecurity practices to protect yourself and your digital assets. Each card below contains valuable information about common security threats and best practices.

IP Address Security

If someone claims to have your IP address, do not be alarmed. The process of tracing an IP address back to a specific home network is typically time-consuming and nearly impossible.

Your IP address alone cannot be used to hack your device or steal your data.

Password Management

Use strong, unique passwords for each account. Consider using a password manager like Bitwarden to generate and store complex passwords securely.

Enable two-factor authentication (2FA) whenever possible for an extra layer of security.

Have I Been Pwned

Check if your email addresses or passwords have been compromised in known data breaches using Have I Been Pwned.

If your email appears in a breach, change your passwords immediately and enable 2FA where possible.

Passkeys

Passkeys are a more secure alternative to passwords that use biometric authentication or device PINs. They're phishing-resistant and can't be stolen like passwords.

Enable passkeys on your accounts when available, especially for critical services like banking and email.

Public Wi-Fi Safety

Never use public Wi-Fi without a VPN. Public networks are often unsecured, making your traffic visible to others on the same network.

Always use a VPN when connecting to public Wi-Fi networks to encrypt your traffic.

Mobile Device Protection

Protect your mobile devices with encryption, biometric authentication, and regular updates. Only install apps from official stores.

Enable device encryption and use biometric authentication when available.

Resume

Education

  1. University of the People, USA

    Bachelor of Science in Computer Science | 2024 - Present
  2. Harvard University

    CS50 Course - Introduction to Computer Science | 2022
  3. Ethical Hacking and Cybersecurity

    Self-Study | 2021 - Present
  4. Web development

    Self-Study | 2020

Experience

  1. WeCare Consultancy - Cyber Security Consultant

    Jan 2024 - Present
  2. GenCourse - Security Researcher

    Nov 2021 - Dec 2023
  3. Frontend Web developer

    2020

Projects

  1. CVE-2023-22809 PoC

  2. Subdomain Enumerator

  3. XSS Scanner

  4. Port Scanner

  5. API Fuzzer

  6. WEB Crawler

  7. Idle Recon Script

  8. File Integrity Monitor

  9. Github Scraper

  10. Keylogger

  11. Directory buster

  12. Honeypot

Operating systems

  1. Linux

    Arch, Kali, Parrot, Blackarch, Amazon Linux, RHEL, Ubuntu, Debian, Fedora, Manjaro, Lubuntu
  2. Windows

    Windows 7, 10, 11

Technical languages

  1. C

  2. Python

  3. SQL

  4. Bash

  5. PowerShell*

  6. HTML

  7. Markdown

Expertise

  1. Fundamental

    Computer hardware knowledge, Networking knowledge, Hyper-V technology knowledge
  2. Red teaming

    OWASP top 10, Active and passive recon, Footprinting, File transfer methods, CMS exploitation(WordPress), Footprinting, Windows and Linux privilege escalation, Vulnerability assessment, Basic AD enumeration & exploitation, Web pentesting.
  3. Blue teaming

    Pyramid of Pain, Cyber Kill Chain, Unified Cyber Kill Chain, Diamond Model, MITRE, Basics of Yara, Network security and traffic analysis, endpoint security monitoring, Security information and event management, Digital forensics and incident response, Analyzing phishing mails.
  4. Tools

    Nmap, Burp Suite, Fuff, Sqlmap, Nessus, Hydra, Metasploit, Wireshark, TCPdump, Responder, Bloodhound, Mimikatz, Rubeus, PowerView, Snort, Zeek, NetworkMiner, Brim, Wazuh, Splunk, Autopsy, Redline, Kape, Volatility.

My Skills Summary

  • Web Application Penetration Testing
    60%
  • Network Penetration Testing
    80%
  • Cloud Security Engineering
    80%
  • Digital Forensics
    70%
  • Incident Response
    65%
  • Malware Analysis
    40%

Certifications

Achievements

Blogs