INITIALIZING...
0%
SYS:BOOT0%

[SYSTEM:INITIALIZED]Offensive & Defensive Security Specialist
Penetration Testing • Network Security • Vulnerability Analysis

About.

I am a dedicated cybersecurity professional with a background in IT support and network administration. My experience has equipped me with deep expertise in securing and managing Active Directory infrastructures, ensuring robust protection against threats.

Currently, I am honing my skills in log analysis, incident response, and the use of specialized tools like EDR, firewalls, DLP, Snort, and Wireshark. As a curious self-learner, I am constantly exploring advanced topics such as malware development, reverse engineering, memory hacking, and initial access techniques. I am particularly interested in leveraging Large Language Models (LLMs) to enhance Blue Team capabilities and strengthen defensive strategies.

I thrive on tackling new challenges and am committed to staying at the forefront of cybersecurity innovation.

Current Focus

  • Log analysis and incident response workflows
  • Malware development and reverse engineering techniques
  • Exploring LLMs for Blue Team automation and threat detection
  • Strengthening Active Directory security through advanced configurations
Terminal displaying network analysis with traffic graphs

Experience.

2022 - Present

Cybersecurity Specialist

TechDefense Inc.

Leading security assessments and implementing robust defensive measures for enterprise clients.

Penetration TestingIncident ResponseSecurity Architecture
2020 - 2022

Network Security Engineer

SecureNet Solutions

Designed and maintained secure network infrastructures with a focus on threat prevention.

Firewall ConfigurationVPN SetupNetwork Monitoring
2018 - 2020

IT Support Specialist

Global Systems

Provided technical support and implemented security best practices across the organization.

System AdministrationUser SupportSecurity Awareness

Projects.

Neo-AI

Neo AI integrates into the Linux terminal for enhanced cybersecurity operations.

PythonAITerminal
View Project

ShadeLoader

A custom loader for executing shellcode with evading techniques.

C++MalwareShellcode
View Project

Simple Process Hollowing

Demonstration of process hollowing for shellcode execution.

C++SecurityWindows API
View Project

Rust C2 Framework

A fully custom Command & Control (C2) framework developed entirely in Rust, designed for advanced security research. (Not yet public)

RustC2Security Research
Coming soon

GitHub Stats

Skills.

Languages

Core Languages

  • Rust

    My language of choice for developing high-performance and secure tools, with a focus on memory safety.

  • Python

    Used to automate pentesting tasks and rapidly develop tools thanks to its flexibility.

  • C++

    Ideal for projects requiring low-level control, such as malware analysis or development.

Additional Languages

  • PHP, Bash, PowerShell

Learning in Progress

  • COBOL

    Currently exploring to understand legacy systems and their potential vulnerabilities.

  • Assembly (ASM)

    Learning to deepen my skills in reverse engineering and malware development.

Favorite Tools

Cobalt Strike and Havoc

My preferred tools for simulating advanced attacks and testing defenses.

Acunetix

Ideal for automating security tests on web applications.

Binary Ninja

My choice for reverse engineering, with an intuitive and powerful interface.

Metasploit

Essential for quickly developing and executing exploits.

Wireshark

Essential for analyzing network traffic and identifying anomalies.

Burp Suite

Perfect for testing web application vulnerabilities and intercepting requests.

Expertise Areas

Offensive Security Techniques

Mastery of attack methodologies to test defenses (e.g., vulnerability exploitation, privilege escalation, etc.).

Defensive Security Strategies

Designing solutions to protect systems against threats (e.g., monitoring).

Exploit Development

Creating and testing exploits to better understand vulnerabilities.

Threat Hunting

Active search for indicators of compromise in IT environments.

Certifications.

SC-900

Completed

2024-2025

AZ-900

In Progress

In progress

Continuously expanding my knowledge and skills through professional certifications and self-directed learning.

Blog.

Technical Articles

Explore my technical articles on cybersecurity, reverse engineering, and malware development.

More technical articles coming soon...

Contact.

Get in touch

Interested in collaborating on cybersecurity projects or need expertise in penetration testing and network security? Feel free to reach out.

Interested in collaborating on cybersecurity projects or need expertise in penetration testing and network security? Feel free to reach out.

Click the button below to send me an email directly.

SEND_MESSAGE.exe