Home
Last updated
Last updated
$whoami
π Hi, Iβm dev-angelist, a Cyber Security Enthusiast with a strong passion for IT, ethical hacking, and knowledge sharing. I believe in working smarter, automating repetitive tasks, and constantly pushing my skills further. π¨βπ» βοΈ This blog is my personal knowledge repository where I document everything I learn from Cybersecurity, Pentesting, and Computer Science and Technology though certifications, lab machines (CTFs), challenges, and real-world experiences. π
π‘ My advice? Experiment boldly. Test every tool and technique you come across. Some might fail, but those failures can teach you the technical reasons whyβand might even inspire you to create your own hacking tool! βοΈ
π₯ The goal is simple: to share insights, techniques, and ideas that can help others on their cybersecurity journey. π I hope these notes help you as much as theyβve helped me while creating them. π Check the menu on the left to get started! π
GitHub ->
My Portfolio ->
Medium ->
Twitter/βοΈ ->
BlueSky ->
πFeel free to send me an email βοΈ
π» The content of this blog is primarily based on my hands-on experiences and continuous learning journey in the cybersecurity realm. It includes:
π Insights into the web security domain, ranging from fundamental to advanced attack vectors.
βοΈ A dedication to improving my technical writing skills to document knowledge clearly and effectively for others.
π€ A strong commitment to contributing to the open-source community, sharing resources, tools, and techniques to help others grow in their cybersecurity journey.
π Each piece of content reflects not only my learnings but also my passion for exploring new frontiers in cybersecurity and giving back to the community. π€
π‘ If you share the same passion for learning and experimenting, I hope youβll find these notes valuable. Together, we can grow and make the cybersecurity community even stronger! πͺ
π The content on this blog is my personal work and interpretation of public materials. While my commentary and analysis are protected, you are free to:
Share links to this content on social media or other websites.
Redistribute content, as long as you credit me and include a link to the original resource.
Disclaimer: This site is for educational purposes only. It should never be used for malicious or illegal activities.
π οΈ Writeups and Walkthroughs of CTFs from platforms like , , , , , as well as using Docker and virtualization tools.
π» Exploration of practices, particularly in and , with a focus on security tools and automation scripts.
π‘οΈ practices, emphasizing secure development lifecycles and automated security testing.
π Deep dives into topics like exploitation, , and , exploring the intersection of emerging technologies and their vulnerabilities.