Page cover image

🏠Home

Welcome βœ‹

$whoami

πŸ‘‹ Hi, I’m dev-angelist, a Cyber Security Enthusiast with a strong passion for IT, ethical hacking, and knowledge sharing. I believe in working smarter, automating repetitive tasks, and constantly pushing my skills further. πŸ‘¨β€πŸ’» ✍️ This blog is my personal knowledge repository where I document everything I learn from Cybersecurity, Pentesting, and Computer Science and Technology though certifications, lab machines (CTFs), challenges, and real-world experiences. πŸ“”

πŸ’‘ My advice? Experiment boldly. Test every tool and technique you come across. Some might fail, but those failures can teach you the technical reasons whyβ€”and might even inspire you to create your own hacking tool! ✏️

πŸ₯… The goal is simple: to share insights, techniques, and ideas that can help others on their cybersecurity journey. πŸ™ I hope these notes help you as much as they’ve helped me while creating them. πŸ‘ˆ Check the menu on the left to get started! πŸš€


About ℹ️

πŸ‘‡Feel free to send me an email βœ‰οΈ

https://github.com/dev-angelist

About the Content πŸ“š

πŸ’» The content of this blog is primarily based on my hands-on experiences and continuous learning journey in the cybersecurity realm. It includes:

  • πŸ› οΈ Writeups and Walkthroughs of CTFs from platforms like TryHackMe, HackTheBox, VulnHub, DockerLabs, PortSwigger, as well as custom-built lab using Docker and virtualization tools.

  • 🌐 Insights into the web security domain, ranging from fundamental to advanced attack vectors.

  • πŸ’» Exploration of coding practices, particularly in Python and PowerShell, with a focus on security tools and automation scripts.

  • πŸ›‘οΈ DevSecOps practices, emphasizing secure development lifecycles and automated security testing.

  • πŸ”“ Deep dives into offensive security topics like Active Directory exploitation, Blockchain security, and AI/ML pentesting, exploring the intersection of emerging technologies and their vulnerabilities.

  • ✍️ A dedication to improving my technical writing skills to document knowledge clearly and effectively for others.

  • 🀝 A strong commitment to contributing to the open-source community, sharing resources, tools, and techniques to help others grow in their cybersecurity journey.

πŸ“˜ Each piece of content reflects not only my learnings but also my passion for exploring new frontiers in cybersecurity and giving back to the community. 🀝

πŸ’‘ If you share the same passion for learning and experimenting, I hope you’ll find these notes valuable. Together, we can grow and make the cybersecurity community even stronger! πŸ’ͺ

Materials are not exhaustive and contents are based on open-source materials and my own interpretations. Mistakes might exist and It may not always be up-to-date, so use it responsibly and at your own risk.


πŸ“ The content on this blog is my personal work and interpretation of public materials. While my commentary and analysis are protected, you are free to:

  • Share links to this content on social media or other websites.

  • Redistribute content, as long as you credit me and include a link to the original resource.

Last updated