I'm a developer who enjoys building apps, learning about cybersecurity, and exploring cryptography.
- Languages: JavaScript (React.js, Node.js), Java, Python, Bash
- Databases: MySQL, MongoDB
- Tools: Git, Docker, Kubernetes
- Security: RSA, AES encryption, Metasploit, Nmap, Gobuster, Burp Suite , Hydra
- Offensive Security: Reconnaissance, Exploitation, Post-Exploitation, Reporting
- Framework: Empire (for post-exploitation)
- Reporting: Markdown, LaTeX
- Web & Mobile DevOps
- Cybersecurity
- End-to-End Encryption: Implementing RSA and AES encryption to secure file uploads and downloads.
- Reconnaissance: Developing tools to scan for open ports, vulnerable services, and subdomains.
- Exploitation: Building simulations of network exploitation and attacks (SQL Injection, XSS).
- Post-Exploitation: Automating lateral movement and data exfiltration in compromised networks.
- Reporting: Generating detailed reports on vulnerabilities, attack vectors, and exploited weaknesses.