I am a cybersecurity expert specializing in ethical hacking, digital defense, and vulnerability assessment.
My primary focus is on proactively identifying and mitigating risks before they can be exploited by malicious actors.
I am strongly committed to safeguarding digital assets and anticipating adversarial tactics to remain one step ahead.
In addition to my cybersecurity expertise, I have a solid background in software development.
I design and implement Python-based tools for automation, threat intelligence, and SIEM optimization.
By integrating security and software engineering, I deliver efficient, resilient, and intelligent defense solutions.
I've been pursuing this journey with passion since 2022.
- Hands-on DFIR, Malware Analysis & Red Team Labs
- Security Tooling Development with (Rust & Python)
- Threat Hunting, SIEM & Detection Engineering
- Focus: Adversarial simulation & detection bypass leading to improvement
I am actively developing expertise across key cybersecurity domains, emphasizing hands-on experience and continuous learning.
- Penetration Testing (Web, Network, Wireless)
- Vulnerability Assessment & Exploit Development
- Malware Analysis & Reverse Engineering
- Incident Response & Digital Forensics
- Threat Hunting & OSINT Investigation
- Detection Engineering (Sigma, SPL, KQL)
- MITRE ATT&CK mapping & adversary emulation
| Category | Tools / Technologies |
|---|---|
| Offensive Security | Metasploit, Burp Suite, Nmap, SQLMap, Gobuster |
| Defensive Security & SIEM | Splunk, ELK Stack, Zeek, Wazuh |
| Digital Forensics (DFIR) | Autopsy, Volatility, FTK Imager, Ghidra |
| Programming & Security Engineering | Python, JavaScript, Bash, PowerShell |
| Cloud & Infrastructure | Docker, Kubernetes, AWS |
| Operating Systems | Kali Linux, Ubuntu, Windows Server |
| OSINT | Maltego, theHarvester, SpiderFoot, Shodan |
- Designing and hosting CTF challenges (Jeopardy & Attack-Defense style)
- Real-world penetration testing scenarios (Web, Network, Wireless)
- Malware analysis, unpacking, and reverse engineering
- Secure coding and auditing in Rust, Python, and Bash
- Contributing to open-source cybersecurity tools and red team utilities
Planned certifications include:
- Offensive Security Certified Professional (OSCP) – Advanced penetration testing and exploit development
- CISSP – Certified Information Systems Security Professional - Enterprise security expertise
- CompTIA Security+ - Foundational cybersecurity knowledge with global recognition
AAPP‑MART is an open‑source Python security engine designed for offensive security research, adversarial modeling, and automated risk assessment.
Focus: Adversary emulation, detection validation, attack path analysis
Technology: Python, MITRE ATT&CK, Multi‑Agent Simulation, Graph Analysis
Official Website: Explore Project
GitHub Repository: Source Code
All repositories include hands-on labs, detection logic, and real-world simulation scenarios.
| Area | Repository | What it Shows |
|---|---|---|
| Offensive Security (Red Teaming) | aapp-mart | The AAPP-MART AI-based cybersecurity engine that simulates attack paths and analyzes system security |
| Detection Engineering (Defensive Security) | security-playbooks | MITRE ATT&CK–based scenarios, detection rules (Sigma, YARA, Suricata), PoCs, labs, and learning material |
| Adversary Emulation / BAS | enterprise-attack-simulator | Simulation framework leveraging MITRE ATT&CK techniques |
| Security Automation (Offensive & Defensive tooling) | secwexen-arsenal | Collection of offensive/defensive automation tools |
- Conducted research in network security and developed new vulnerability scenarios.
- Developed new Python modules for the open-source security tool “AAPP-MART”.
- Published technical research notes on malware reverse engineering and network protocol analysis.
- Performed vulnerability assessments and created Proof of Concept (PoC) exploits in controlled lab environments.
- Designed and hosted CTF challenges adopted by local cybersecurity communities.
Applied security research and technical notes on hardware security, wireless protocol analysis, and offensive security tooling.
- Portfolio: CTF Writeups & Labs
- Blog: Technical Blog Posts
- Reflections: Security Research & Reflections
For professional collaboration or technical inquiries, feel free to reach.
- Website: About & Portfolio
- E-mail: Not available
- GitHub: GitHub Profile
- Gist: Code Snippets & PoCs
- PGP Public Key: Download PGP Public Key
- All research, simulations, and tools are conducted in controlled environments for learning and defensive purposes.
- Responsible disclosure is strictly followed for any vulnerabilities discovered.
- Tools are not intended for illegal use; misuse is strictly prohibited.
- The goal is to enhance detection, improve defenses, and advance security research.
- All materials are provided solely for educational and defensive security purposes, and users are fully responsible for their own actions.
- All content is provided "as-is" without any warranties; I make no guarantees regarding accuracy, functionality, or suitability for any particular purpose.
- By accessing or using the information and materials provided here, you agree to use them responsibly, ethically, and in compliance with all applicable laws.
- Developing Rust-based security tools for automation
- Studying advanced malware analysis and reverse engineering
- Preparing for OSCP certification
- Building new CTF challenges for Red Team simulations
- I am experimenting with threat-hunting automation and SIEM data analysis
Copyright © 2025-2026 secwexen. All Rights Reserved.


