██╗███╗░░░███╗░█████╗░██████╗░ ░█████╗░██╗░░░██╗░██████╗░██╗░░░██╗░█████╗░██╗░░██╗██╗ ██║████╗░████║██╔══██╗██╔══██╗ ██╔══██╗██║░░░██║██╔════╝░██║░░░██║██╔══██╗██║░░██║██║ ██║██╔████╔██║███████║██║░░██║ ██║░░██║██║░░░██║██║░░██╗░██║░░░██║███████║███████║██║ ██║██║╚██╔╝██║██╔══██║██║░░██║ ██║░░██║██║░░░██║██║░░╚██╗██║░░░██║██╔══██║██╔══██║██║ ██║██║░╚═╝░██║██║░░██║██████╔╝ ╚█████╔╝╚██████╔╝╚██████╔╝╚██████╔╝██║░░██║██║░░██║██║ ╚═╝╚═╝░░░░░╚═╝╚═╝░░╚═╝╚═════╝░ ░╚════╝░░╚═════╝░░╚═════╝░░╚═════╝░╚═╝░░╚═╝╚═╝░░╚═╝╚═╝
About Me
Once upon a time, long before certifications and titles, I was just a curious mind drawn to the unseen — fascinated by how things break and how they're meant to be protected. I wasn't taught to look for vulnerabilities; I sensed them — like a sixth sense for digital flaws.
My journey into cybersecurity wasn't sparked by trends or hype. It began with late nights chasing flags in CTF competitions, digging deep into code, and getting lost (and found) in the world of binary and shell scripts. I didn't just learn to hack — I learned to understand systems from the inside out.
I've helped secure domains from the DNS layer with SPF, DKIM, and DMARC, tracked down vulnerabilities in websites, and supported others in protecting their digital spaces. Every project, every bug report, every red teaming exercise has been a step forward.
But this isn't a career for me. It's something much more personal. I've put everything else in my life on pause just to focus on it — because this is where my passion lives. It's not a job. It's not about money or titles. It's something I feel, deeply — a part of who I am.
Today, I continue the hunt on platforms like HTB, and private labs — sharpening my skills not just to exploit, but to protect. I carry with me the mindset of a Red Teamer, the patience of a reverse engineer, and the passion of someone who simply can't stop digging deeper.
This isn't a job for me. It's not even a career. It's a calling.
Available Resume Downloads:
Tools & Technologies
Red Team Operations
Simulating real-world cyber attacks to test and strengthen organizational security posture. Advanced penetration testing and vulnerability assessments.
Bug Bounty Hunting
Proactively identifying and reporting security vulnerabilities in web applications and systems. Specialized in XSS, SQL injection, and API security issues.
Email Security Implementation
Led email security initiatives including DNS configuration (SPF, DKIM, DMARC) and domain management. Protected domains from email spoofing and phishing attacks.
Web Application Security
Securing web applications against common vulnerabilities. Conducted security audits and implemented secure coding practices for multiple clients.
PFE M2 - Pentesting Project
Master's degree final project: Comprehensive penetration testing of a private website with detailed security reports and remediation solutions.
CTF Competitions
Third place in national CTF competition. Regular participation in HackTheBox, TryHackMe, and other cybersecurity challenges to sharpen skills.