< Previous Projects />
A collection of my work in programming, cybersecurity, and other technical domains.
Secure Chat Application
End-to-end encrypted messaging platform with zero-knowledge architecture.
Network Intrusion Detection System
ML-powered system to detect and alert on suspicious network activity.
Blockchain Voting System
Secure and transparent voting platform built on blockchain technology.
Password Manager
Zero-knowledge password manager with biometric authentication.
Vulnerability Scanner
Automated tool to scan web applications for common security vulnerabilities.
Secure File Sharing
Platform for secure file sharing with granular access controls and audit logs.
< CTF Writeups />
Detailed walkthroughs of Capture The Flag challenges I've solved.
Web Exploitation: SQL Injection
Bypassing authentication through SQL injection vulnerabilities.
Reverse Engineering: Malware Analysis
Analyzing a malicious binary to extract the hidden flag.
Cryptography: RSA Challenge
Breaking weak RSA implementation to decrypt the flag.
Forensics: Memory Analysis
Extracting evidence from a memory dump to recover the flag.
Binary Exploitation: Buffer Overflow
Exploiting a buffer overflow vulnerability to gain shell access.
OSINT: Digital Footprint Analysis
Using open-source intelligence to track down information.
< Skills & Expertise />
My technical skills and areas of expertise in cybersecurity, programming, and related fields.
Penetration Testing
Identifying and exploiting security vulnerabilities in systems and networks.
Digital Forensics
Collecting and analyzing digital evidence for incident response and investigations.
VB.NET
Building Windows applications and automation tools with Visual Basic .NET.
C#
Developing robust applications and tools for the .NET ecosystem.
HTML/CSS
Creating responsive and visually appealing web interfaces.
JavaScript
Building interactive web applications and implementing client-side functionality.
Python
Developing security tools, automation scripts, and data analysis.
React
Building modern, component-based user interfaces and single-page applications.
< Timeline of My Journey />
A chronological journey through my learning path, certifications, and key milestones.
The Beginning of My Journey
UnknownAt 9, my teacher challenged me to bypass a WinRAR password. That challenge sparked my passion for hacking and cybersecurity.
Exploring Hacking & Finding Vulnerabilities
UnknownSpent time exploring hacking techniques and discovered vulnerabilities in multiple companies.
Selling Hacking & Social Media Tools
UnknownSold hacking tools and third-party social media tools, gaining insight into cybersecurity risks and exploits.
VB.NET Course Instructor
UnknownTaught a VB.NET course to 30 students, sharing knowledge about software development and programming logic.
.NET Reverse Engineering
Mar 17Completed a deep dive into .NET Reverse Engineering, exploring how software can be decompiled, analyzed, and modified.
React Development
Feb 19Completed a React course, gaining expertise in building modern, interactive web applications.
Bug Bounty Hunting
Jun 10Completed a Bug Bounty course, sharpening my skills in web security, ethical hacking, and vulnerability hunting.
Game Hacking with Cheat Engine
Sep 9Explored Cheat Engine, learning how games process memory and how to manipulate them for educational purposes.
Founder & CEO of SecureHoot
Oct 5SecureHoot, a company specializing in cybersecurity services and web devlopment
Social Engineering Course
Aug 26Completed a Social Engineering course, focusing on psychological manipulation and security awareness.
Founder & CEO of HootHunters
Nov 1Founded HootHunters, a sub-company of SecureHoot, providing cybersecurity courses and a bug bounty platform.