About me
I'm a passionate offensive security enthusiast at the beginning of my journey — but I’m not here to play small. I’m here to break barriers, challenge norms, and make my mark in the world of cybersecurity.
My focus is on real-world exploit development, web application hacking, and penetration testing. I specialize in uncovering critical security flaws like SQL Injection, logic bugs, authentication bypasses, and privilege escalation vulnerabilities.
I run my own Docker-based lab, packed with intentionally vulnerable applications where I simulate real-world attack scenarios and train like a storm. I build custom tools and scripts to automate my recon and testing processes, pushing the boundaries with every challenge I face.
My work is grounded in methodologies like the OWASP Top 10, MITRE ATT&CK, and red teaming principles. I’m constantly solving CTFs, breaking things on purpose — and learning from every single failure.
I may have just started, but I'm moving fast.
My name will echo in the cybersecurity scene — mark my words.
⚡ Watch this space. The storm is coming.
What i'm doing
-
🛡️ Web Security & Ethical Hacking
I specialize in identifying and exploiting web vulnerabilities like SQL Injection, XSS, and authentication bypass. My focus is on understanding how attackers think to better secure systems.
-
🧪 Custom Lab Creation
I design and build personalized hacking labs using Docker, simulating real-world attack scenarios to practice and teach advanced techniques in a safe environment.
-
📚 Technical Blogging & Write-ups
I write clear, hands-on tutorials and challenge walkthroughs to help others learn ethical hacking in a practical and step-by-step way — focusing on real-world cases.
-
💻 Full-Stack Web Development
With solid skills in both frontend and backend, I build fast, secure, and responsive websites — applying modern standards with a hacker’s mindset.
Testimonials
