π Home
Last updated
Last updated
$whoami
π Hi, Iβm dev-angelist, a Cyber Security Enthusiast with a strong passion for IT, ethical hacking, and knowledge sharing. I believe in working smarter, automating repetitive tasks, and constantly pushing my skills further. π¨βπ» βοΈ This blog is my personal knowledge repository where I document everything I learn from Cybersecurity, Pentesting, and Computer Science and Technology though certifications, lab machines (CTFs), challenges, and real-world experiences. π
π‘ My advice? Experiment boldly. Test every tool and technique you come across. Some might fail, but those failures can teach you the technical reasons whyβand might even inspire you to create your own hacking tool! βοΈ
π₯ The goal is simple: to share insights, techniques, and ideas that can help others on their cybersecurity journey. π I hope these notes help you as much as theyβve helped me while creating them. π Check the menu on the left to get started! π
GitHub -> https://github.com/dev-angelist
My Portfolio -> https://dev-angelist.github.io/
Medium -> https://medium.com/@dev-angelist
Twitter/βοΈ -> https://x.com/dev4ngelist
πFeel free to send me an email βοΈ
π» The content of this blog is primarily based on my hands-on experiences and continuous learning journey in the cybersecurity realm. It includes:
π οΈ Writeups and Walkthroughs of CTFs from platforms like TryHackMe, HackTheBox, VulnHub, DockerLabs, as well as custom-built machines using Docker and virtualization tools.
π Insights into the web security domain, ranging from fundamental to advanced attack vectors.
π» Exploration of coding practices, particularly in Python and PowerShell, with a focus on security tools and automation scripts.
π Deep dives into offensive security topics like Active Directory exploitation, Blockchain security, and AI/ML pentesting, exploring the intersection of emerging technologies and their vulnerabilities.
βοΈ A dedication to improving my technical writing skills to document knowledge clearly and effectively for others.
π€ A strong commitment to contributing to the open-source community, sharing resources, tools, and techniques to help others grow in their cybersecurity journey.
π Each piece of content reflects not only my learnings but also my passion for exploring new frontiers in cybersecurity and giving back to the community. π€
π‘ If you share the same passion for learning and experimenting, I hope youβll find these notes valuable. Together, we can grow and make the cybersecurity community even stronger! πͺ
Materials are not exhaustive and contents are based on open-source materials and my own interpretations. Mistakes might exist and It may not always be up-to-date, so use it responsibly and at your own risk.
π The content on this blog is my personal work and interpretation of public materials. While my commentary and analysis are protected, you are free to:
Share links to this content on social media or other websites.
Redistribute content, as long as you credit me and include a link to the original resource.
Disclaimer: This site is for educational purposes only. It should never be used for malicious or illegal activities.
π‘οΈ practices, emphasizing secure development lifecycles and automated security testing.