Cybersecurity
- Threat analysis and vulnerability assessment
- Security research and defensive tooling
- Incident-aware design and reporting
Cybersecurity | Software Development | Pentesting
Cybersecurity enthusiast specializing in penetration testing and vulnerability assessment. Building practical tooling, security automation, and resilient systems for real-world defense.
Blending offensive testing with software craftsmanship to ship tools that are reliable, transparent, and ready for the field.
Practical security, measured reporting, and clean engineering.
Focused on finding vulnerabilities before adversaries do, with disciplined testing and clear, actionable remediation guidance.
Builds maintainable Python tooling, automation workflows, and web systems that support repeatable security processes.
Active in open source, looking to collaborate on security tools, research, and high-trust software.
Three pillars that drive the work.
Depth across security, automation, and delivery.
Scanning, risk notes, and remediation guidance.
CLI utilities, reporting, and testable modules.
Flask demos, templates, and responsive UI.
Log analysis, monitoring, and workflow scripting.
Linux, networking, and safe testing workflows.
SQLite, JSON/CSV reporting, and parsers.
Projects updated or created this year with security at the core.
Defensive keylogger awareness tools for Linux, including input-device detection and consent-based keystroke demo flows.
File integrity monitoring toolkit focused on detecting tampering and suspicious changes across sensitive assets.
Multi-threaded network scanner with service detection, enumeration, and reporting for fast infrastructure visibility.
Entropy-based password analysis with pattern detection, scoring tiers, and a Flask interface for real-time testing.
Automated scheduling agent integrating WhatsApp messaging with calendar workflows for streamlined event management.
Rapid security scripting collection supporting automation, offensive testing workflows, and tooling prototypes.
Problem, approach, and results for key projects.
Need fast, repeatable visibility across hosts and ports with minimal setup.
Thread pool scanner that supports ranges, CIDR, TCP or UDP, plus progress and ETA.
Exportable CSV or JSON reports and a local-only web UI wrapper for safer demos.
Detect file tampering and changes across sensitive assets with clarity.
Baseline hashing with SHA-256, scanning diffs, and optional real-time watching.
Clear created/modified/deleted alerts, log files, and JSON configuration control.
Short write-ups tied to the repositories.
Entropy-based scoring, blacklist checks, and pattern detection with JSON output.
RepositoryProcess scanning for input-device access plus a consent-based demo app.
RepositoryAuth-log analyzer with follow mode, blocklist output, and dry-run auto-blocking.
RepositoryFlask service with Twilio webhooks, Google Calendar, and SQLite persistence.
RepositoryTechnical references, usage guides, and deeper breakdowns.
Deep technical breakdown and design notes.
DETAILED_DOCUMENTATION.mdUsage reference with examples and safety guidance.
docs/USAGE.mdLab documentation and CLI reference for the scripts.
LAB_DOCUMENTATION.mdCase-study style snapshots that show impact and approach.
Built a scanner that handles ranges, CIDR blocks, and flexible port selection.
Built a CLI and web demo for password evaluation with clear, actionable feedback.
Built a baseline and scanning workflow with optional real-time watching.
Built tools that inspect input-device access with a safe, consent-based demo.
Built a Flask service that schedules events through WhatsApp and Google Calendar.
Security-focused technologies and platforms in active use.
Metasploit, Wireshark, Nmap, Burp Suite, SQLMap, Nikto
Python, JavaScript
Linux, Ubuntu, Git, GitHub, Docker
MongoDB, PostgreSQL
Verified training and professional development.
Live progress from my TryHackMe profile and room streak.
Open to collaboration, consulting, and security-focused roles.
Email is the fastest way to connect.