Loading...

$Whoami$

Pentester | Red Team Operator | Security Researcher

🎯 About Me

I’m a passionate cybersecurity professional specializing in penetration testing and red team operations. With a keen eye for vulnerabilities and a love for breaking (and fixing) things, I help organizations strengthen their security posture.

When I’m not hunting for vulnerabilities, you’ll find me writing technical blog posts, participating in CTF competitions, and contributing to the security community.


πŸ’Ό What I Do

Intern Penetration Tester At VNPT Cyber Immunity

πŸ” Penetration Testing

Comprehensive security assessments across web applications, networks, and infrastructure. I identify vulnerabilities before attackers do.

🎭 Red Team Operations

Simulating real-world attack scenarios to test organizational defenses and incident response capabilities.

πŸ“ Security Research

Discovering new attack vectors, documenting vulnerabilities, and sharing knowledge through detailed write-ups.

πŸ΄β€β˜ οΈ CTF Player

Active participant in Capture The Flag competitions, constantly sharpening my skills and learning new techniques.


πŸ› οΈ Technical Arsenal

Languages & Scripting:

  • Python | Bash | JavaScript | Java | PHP

Security Tools:

  • Burp Suite | Metasploit | Nmap | Wireshark
  • SQLMap | Nikto | Gobuster | Hydra

Specializations:

  • Web Application Security
  • Command Injection & RCE
  • File Upload Vulnerabilities
  • Authentication Bypass
  • Privilege Escalation

πŸ† Recent Achievements

  • πŸ₯‡ Solved multiple CTF challenges on various platforms
  • πŸ“š Published detailed write-ups for security vulnerabilities
  • πŸŽ“ Continuously expanding knowledge in offensive security
  • 🀝 Active contributor to the cybersecurity community

πŸ“« Get In Touch

I’m always interested in collaborating on security projects, discussing vulnerabilities, or sharing knowledge. Feel free to reach out!


πŸ“– Latest Blog Posts

Check out my recent write-ups on the home page or explore by categories and tags.


"The only truly secure system is one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards." - Gene Spafford