root@home:~
$Welcome to my Cybersecurity Terminal

Breaking BarriersSecuring Systems

Capture The Flag • Penetration Testing • Infrastructure Defense

CONNECTEDENCRYPTEDSECURE
SECURE • AUDIT • PROTECT • ANALYZE • HARDEN • MONITOR • RESPOND • FORENSICS • THREAT HUNTING • SECURE • AUDIT • PROTECT • ANALYZE • HARDEN • MONITOR • RESPOND • FORENSICS • THREAT HUNTING
root@home:~/featured_write-ups$ ls

Featured Write-ups

[NNS CTF 2025] Web - GOllum Writeup

Yess, you can looks at it… but not takes it away, preciousss. No, no, never removes it!

Aug 31, 2025web

[NNS CTF 2025] Misc - tobe Writeup

Tobe is a vault for storing the flag, only those with a valid key may get the flag. To increase security the key is stored absolutely nowhere :)

Aug 31, 2025misc

[L3akCTF 2025] Forensics - L3ak Advanced Defenders Writeup

You have been trying to infiltrate the L3ak office for some time, and your friend just gave you this mysterious snapshot. What information can you glean from it?

Jul 14, 2025forensics
[cat certifications/*]

Certifications & Credentials

Validated expertise in cybersecurity domains

🔒

Certified API Security Analyst

APIsec UniversitySeptember 2024
🟣

CWL Purple Teaming Fundamentals

CyberWarFare LabsNovember 2023
💻

Practical Ethical Hacking - The Complete Course

TCM SecurityDecember 2022
[ cat tools_and_technologies/* ]

Key Tools & Technologies

Wireshark
Network Analysis
Metasploit Framework
Exploitation
Burp Suite
Web App Testing
Nmap
Network Scanning
Splunk
SIEM
Kali Linux
Penetration Testing
ELK Stack
Log Analysis
Autopsy
Digital Forensics
Volatility
Memory Forensics
FTK Imager
Disk Forensics