Cybersecurity & Ethical Hacking Expert
I specialize in ethical hacking, digital defense, and vulnerability assessment with a focus on proactive risk mitigation.
My priority is to identify and reduce risks before they are exploited. I am committed to protecting digital assets and anticipating adversarial tactics to stay ahead.
Beyond security, I have a solid software engineering background. I design Python- and Rust-based tools for automation, threat intelligence, and SIEM optimization — delivering efficient, resilient, and intelligent defense solutions.
I've been pursuing this journey with passion since 2022.
┌──(secwexen㉿kalilinux)-[~/system-audit] └─$ sudo lynis audit system [sudo] password for secwexen: ********** [INFO] Starting system audit (lynis 3.1.0)... [✓] Core system checks completed [✓] Network interfaces analyzed: eth0, wlan0 [✓] Security controls detected: nftables, apparmor, fail2ban [INFO] Vulnerabilities and warnings: ├─ CVE-2024-6387: OpenSSH regreSSHion (system vulnerable) ├─ Kernel outdated: 6.5.0 (latest stable: 6.8.x) └─ SSH PasswordAuthentication enabled (weak security) [✓] Hardening actions applied: ├─ SSH: PasswordAuthentication disabled ├─ Fail2ban: ssh jail enabled and restarted └─ Sysctl: net.ipv4.conf.*.rp_filter set to strict [✓] Firewall rules verified (nftables active, inbound default deny) [✓] AppArmor profiles enforced [✓] AIDE integrity database updated [✓] Report saved to /var/log/lynis-report.dat
About
All research and experiments are conducted in controlled environments under ethical frameworks and responsible disclosure principles. The goal is to detect risks early, reduce impact, strengthen systems, and make security measurable.
Expertise Summary
Offensive & Defensive Security
Red/Blue team simulations, vulnerability assessments, and exploit development.
Rust & Python Engineering
Tools for automation, threat intelligence, and SIEM optimization.
OSCP Prep | Threat Hunting | SIEM
Hands-on labs, log analytics, and detection engineering.
CTF Creator & Participant
Designing and hosting Jeopardy and Attack-Defense challenges.
Focus Areas & Current Learning Path
Offensive Security
- Penetration Testing (Web, Network, Wireless)
- Vulnerability assessment & exploit development
- Malware analysis & reverse engineering
- Red team simulation & adversary behavior analysis
- CTF challenge creation & hosting
Defensive Security
- Incident response & digital forensics
- Threat hunting & OSINT investigations
- SIEM automation & detection engineering
- Advanced threat modeling & risk assessment
- Zero Trust architecture design & implementation
Software & Systems
- Secure development (Rust, Python, Bash, C)
- Network protocol analysis (Wireshark, Scapy)
- Memory-safe systems with Rust
- Container & cloud security (Docker, Kubernetes, AWS, Azure, GCP)
- Security automation with CI/CD (Actions, GitLab CI, Jenkins)
Technology Stack
Offensive Security
Metasploit, Metasploitable 2, Burp Suite, Nmap, SQLMap, Hydra, Gobuster, more.
Defensive & Monitoring
Splunk, ELK Stack, Wireshark, Suricata, Zeek, Wazuh.
Forensics
Autopsy, Volatility, FTK Imager, Binwalk, Ghidra, IDA Free.
Programming
Rust, Python, Bash, C, PowerShell.
Cloud & Infrastructure
Docker, Kubernetes, AWS, Azure, GCP.
OSINT Tools
Maltego, theHarvester, SpiderFoot, Shodan, Recon-ng, FOCA, Google Dorks, OSINT Framework.
Hardware & Security Toolkit
Specialized hardware used strictly in controlled lab environments for ethical research.
Flipper Zero
RF/IR/NFC exploration and trainingHackRF One
SDR and protocol analysisProxmark3 RDV4
RFID security researchWiFi Pineapple
Wireless security testingProjects & Contributions
AAPP‑MART — Autonomous Attack Path Prediction & Multi‑Agent Red Team Engine
AI‑driven framework for predicting attack paths and simulating them with autonomous red‑team agents. Designed for continuous security testing and adversarial analysis.
Achievements & Contributions
- Research in network security; developed new vulnerability scenarios
- Built new Rust modules for Obscuron
- Published technical notes on malware reverse engineering & protocol analysis
- Performed vulnerability assessments in lab and authored PoC exploits
- Designed CTF challenges adopted by local security communities
Ongoing Projects
- Rust-based security tooling for automation
- Advanced malware analysis & reverse engineering
- OSCP preparation & HackTheBox labs
- New CTF challenges for red team simulations
- Threat hunting automation & SIEM data analytics
Certification Goals & Academic Focus
Planned Certifications
- OSCP — Offensive Security Certified Professional
- CEH — Certified Ethical Hacker
- GSEC — GIAC Security Essentials
- CISSP — Information Systems Security
- CompTIA Security+ — Foundational knowledge
Academic Focus
- Secure systems design, malware analysis, incident response
- MITRE ATT&CK & NIST frameworks — lab applications
- Continuous learning through CTFs & collaborative projects
Contact & Links
Online Presence
Secure Contact
For collaboration or questions, please reach out via GitHub.
Ethics & Legal Notice
- All research and experiments are conducted in controlled environments.
- Strict adherence to responsible disclosure principles.
- No illegal activities — no support or engagement in unlawful behavior.
- Always learning, defending, and innovating responsibly.
- The logo is an abstraction of a closed padlock, symbolizing digital security.
⭐ If you find my projects useful, don’t forget to give them a star!
🔔 Also, consider following me to stay updated on my latest cybersecurity tools and write-ups.
🤝 For collaboration or inquiries, please reach out via my portfolio or GitHub.