Passionate Ethical Hacker and Security Researcher with a deep focus on Red Team Operations, Exploit Development, and Offensive Security. I specialize in building custom tools, developing exploits, and researching vulnerabilities to strengthen defensive postures.
When I'm not breaking systems ethically, I'm tinkering with Linux internals, automating workflows, or competing in CTF challenges. I believe in the philosophy of understanding systems from the ground up—from kernel modules to network protocols.
Currently contributing to security projects at @S1b-Team and actively researching new attack vectors and evasion techniques.
- ✅ OSCP – Offensive Security Certified Professional (Completed)
- ✅ ARTE – Advanced Red Team Engagement (Certified)
- ✅ CASP+ – CompTIA Advanced Security Practitioner
- 🔄 CEH – Certified Ethical Hacker (In Progress)
Development of custom payloads, OPSEC-safe C2 infrastructure, spear-phishing campaigns, and full-scale adversary emulation. Focused on realistic attack scenarios that help organizations identify and remediate security gaps.
Deep expertise in memory corruption (stack/heap overflows), web vulnerabilities (XSS, RCE, SSRF, IDOR), and privilege escalation techniques across both kernel and userland contexts.
Building automated reconnaissance pipelines, custom offensive tools, and data parsing frameworks for red team operations. Focus on efficiency and reproducibility in security assessments.
Experienced in static and dynamic analysis of binaries, solving pwn challenges, and researching both public and private CVEs. Comfortable with x86/x64 assembly and low-level debugging.
Conducting deep security audits of modern web applications, exploiting OWASP Top 10 vulnerabilities, WAF bypass techniques, and abusing REST/GraphQL APIs.
Creating custom packers and crypters, implementing AV/EDR evasion techniques, sandbox detection, process injection, and API hooking for advanced persistence mechanisms.
Gathering and analyzing threat intelligence, tracking adversary TTPs, and leveraging OSINT methodologies for reconnaissance and target profiling.
Integrating security into the development lifecycle, performing secure code reviews, and building security-first infrastructure with automation and monitoring.
I breathe terminal. Linux is not just an OS—it's a way of thinking.
From bare-metal installations to kernel hardening, I thrive in the deep internals of Linux systems. Whether it's writing custom systemd services, compiling kernels, or optimizing network stacks, I enjoy every layer of the stack.
Favorite Distros: Arch Linux 🖤 | Debian | Kali | NixOS
🔐 Currently building and contributing to internal security tools at @S1b-Team
🛠️ Custom payload generators, enumeration scripts, and reconnaissance automation tools are part of my daily workflow
🧪 Actively researching new exploitation techniques and publishing findings responsibly
🐧 Maintaining dotfiles-s1b - Complete Arch Linux configuration with DWM, custom themes, and development environment
"The quieter you become, the more you can hear." — Kali Linux motto