Projects

Language

Choose your preferred language

Security

Security Focus

Cybersecurity is more than a field—it's a mindset. Here's how I approach security: learning, building, and breaking things responsibly.

Why Security Matters to Me

I've always been fascinated by how systems work—and more importantly, how they fail. Security is about understanding that gap: what happens when assumptions break, when inputs are malicious, when trust is misplaced.

My approach is practical: I don't just read about exploits—I reproduce them in labs, understand the root cause, and learn how to prevent them. Every vulnerability is a lesson in better engineering.

Focus Areas

Security Engineering

Designing and implementing secure architectures with defense-in-depth principles.

Vulnerability Research

Finding, analyzing, and reporting security flaws through rigorous testing methodologies.

Network Security

Implementing secure protocols, monitoring traffic, and defending against network-based attacks.

Security Automation

Building tools and scripts to automate security testing, monitoring, and incident response.

Security Skills & Tools

Offensive Security

Penetration TestingWeb Application SecurityNetwork ExploitationSecurity Audits

Defensive Security

Threat DetectionIncident ResponseSecurity MonitoringLog Analysis

Security Tools

WiresharkNmapBurp SuiteMetasploitOWASP ZAPNessus

Core Knowledge

CryptographyAuthentication & AuthorizationOWASP Top 10Security Best Practices

Security Mindset

Think Like an Attacker

Understanding how adversaries think and operate is crucial for building resilient defenses.

Defense in Depth

Security isn't one layer—it's multiple controls working together to minimize risk.

Continuous Learning

The threat landscape evolves daily. Staying current with new vulnerabilities and techniques is essential.

Ethical Responsibility

Skills must be used responsibly. Security research should improve systems, not harm them.

My Approach

Learn

Study vulnerabilities, attack vectors, and defense mechanisms through CTFs, courses, and research.

Build

Create secure applications and tools that implement security best practices from the ground up.

Break

Test systems in controlled environments to find weaknesses before malicious actors do.

Improve

Document findings, share knowledge, and help teams build more secure systems.