Cybersecurity & Ethical Hacking Expert

I specialize in ethical hacking, digital defense, and vulnerability assessment with a focus on proactive risk mitigation.

Offensive & Defensive OSCP Preparation Threat Hunting SIEM Automation Rust & Python

My priority is to identify and reduce risks before they are exploited. I am committed to protecting digital assets and anticipating adversarial tactics to stay ahead.

Beyond security, I have a solid software engineering background. I design Python- and Rust-based tools for automation, threat intelligence, and SIEM optimization — delivering efficient, resilient, and intelligent defense solutions.

Journey since 2021 — ongoing cybersecurity path

Terminal — captain@kalilinux: ~/missions
┌──(captain㉿kalilinux)-[~/missions]
└─$ sudo cybersecurity --analyze --reinforce
[sudo] password for captain: ********

[INFO] Initializing cybersecurity module v2.4.7...
[] Scanning system files... (completed in 3.2s)
[] Network interfaces analyzed: eth0, wlan0
[] Vulnerabilities identified: 3 critical, 12 moderate
    ├─ CVE-2025-1423: Unpatched kernel exploit
    ├─ CVE-2025-1876: OpenSSH misconfiguration
    └─ CVE-2025-1999: Privilege escalation vector
[] Reinforcement protocols executed:
    ├─ Kernel patch applied
    ├─ SSH hardened (key-only auth, port change)
    └─ User privilege audit completed
[] Firewall rules updated (iptables + nftables synced)
[] SELinux policies enforced (strict mode)
[] Logs archived and encrypted to /var/log/secure-archive/mission-1006.tar.gpg

┌──(captain㉿kalilinux)-[~/missions]
└─$ echo "We understand. We secure."
We understand. We secure.

└─$  
                        

Security is not only about building defenses; it’s about understanding exploitation to design stronger, more resilient systems.

About

All research and experiments are conducted in controlled environments under ethical frameworks and responsible disclosure principles. The goal is to detect risks early, reduce impact, strengthen systems, and make security measurable.

"Curiosity fuels understanding. Understanding builds security."

Expertise Summary

Offensive & Defensive Security

Red/Blue team simulations, vulnerability assessments, and exploit development.

Rust & Python Engineering

Tools for automation, threat intelligence, and SIEM optimization.

OSCP Prep | Threat Hunting | SIEM

Hands-on labs, log analytics, and detection engineering.

CTF Creator & Participant

Designing and hosting Jeopardy and Attack-Defense challenges.

Focus Areas & Current Learning Path

Offensive Security

  • Penetration Testing (Web, Network, Wireless)
  • Vulnerability assessment & exploit development
  • Malware analysis & reverse engineering
  • Red team simulation & adversary behavior analysis
  • CTF challenge creation & hosting

Defensive Security

  • Incident response & digital forensics
  • Threat hunting & OSINT investigations
  • SIEM automation & detection engineering
  • Advanced threat modeling & risk assessment
  • Zero Trust architecture design & implementation

Software & Systems

  • Secure development (Rust, Python, Bash, C)
  • Network protocol analysis (Wireshark, Scapy)
  • Memory-safe systems with Rust
  • Container & cloud security (Docker, Kubernetes, AWS, Azure, GCP)
  • Security automation with CI/CD (Actions, GitLab CI, Jenkins)

To truly understand security, I believe in continuous experiments: break systems, repair them, and rebuild them stronger.

Technology Stack

Offensive Security

Metasploit, Metasploitable 2, Burp Suite, Nmap, SQLMap, Hydra, Gobuster, more.

Defensive & Monitoring

Splunk, ELK Stack, Wireshark, Suricata, Zeek, Wazuh.

Forensics

Autopsy, Volatility, FTK Imager, Binwalk, Ghidra, IDA Free.

Programming

Rust, Python, Bash, C, PowerShell.

Cloud & Infrastructure

Docker, Kubernetes, AWS, Azure, GCP.

OSINT Tools

Maltego, theHarvester, SpiderFoot, Shodan, Recon-ng, FOCA, Google Dorks, OSINT Framework.

Hardware & Security Toolkit

Specialized hardware used strictly in controlled lab environments for ethical research.

Flipper Zero

RF/IR/NFC exploration and training

HackRF One

SDR and protocol analysis

Proxmark3 RDV4

RFID security research

WiFi Pineapple

Wireless security testing

Raspberry Pi

Portable lab & automation

Projects & Contributions

Obscuron — Advanced Cybersecurity Framework

Modular platform for red teams, analysts, and incident responders. Provides system analysis, memory forensics, and controlled attack operations.

Status
v1.0.0 — Actively maintained
License
GPL v3.0
Source Code

Achievements & Contributions

  • Research in network security; developed new vulnerability scenarios
  • Built new Rust modules for Obscuron
  • Published technical notes on malware reverse engineering & protocol analysis
  • Performed vulnerability assessments in lab and authored PoC exploits
  • Designed CTF challenges adopted by local security communities

Ongoing Projects

  • Rust-based security tooling for automation
  • Advanced malware analysis & reverse engineering
  • OSCP preparation & HackTheBox labs
  • New CTF challenges for red team simulations
  • Threat hunting automation & SIEM data analytics

Certification Goals & Academic Focus

Planned Certifications

  • **OSCP** — Offensive Security Certified Professional
  • **CEH** — Certified Ethical Hacker
  • **GSEC** — GIAC Security Essentials
  • **CISSP** — Information Systems Security
  • **CompTIA Security+** — Foundational knowledge

Academic Focus

  • Secure systems design, malware analysis, incident response
  • MITRE ATT&CK & NIST frameworks — lab applications
  • Continuous learning through CTFs & collaborative projects

Contact & Links

Online Presence

Secure Contact

Email
Coming soon
PGP Key
Coming soon — for secure communication

For collaboration or questions, please reach out via GitHub.

Ethics & Legal Notice

  • All research and experiments are conducted in controlled environments.
  • Strict adherence to responsible disclosure principles.
  • No illegal activities — no support or engagement in unlawful behavior.
  • Always learning, defending, and innovating responsibly.
  • The logo is an abstraction of a closed padlock, symbolizing digital security.

⭐ If you find my projects useful, consider starring them.
👥 Follow for updates on the latest tools and posts.