Cybersecurity expert specializing in offensive security, adversarial simulation, DFIR, and detection engineering.
Experienced in identifying attack paths, analyzing complex threat activity, and developing security tooling for both offensive research and defensive operations.
Strong background in Python security engineering, with practical experience in SIEM optimization, malware analysis, threat hunting, and MITRE ATT&CK–driven adversary emulation. Focused on building scalable security automation, improving detection capabilities, and advancing real-world attack simulation methodologies.
- Hands-on DFIR, Malware Analysis & Red Team Labs
- Security Tooling Development with (Rust & Python)
- Threat Hunting, SIEM & Detection Engineering
- Adversarial simulation and detection bypass leading to improvement
- Security research, vulnerability analysis, and PoC development in lab environments
I am actively developing expertise across key cybersecurity domains, emphasizing hands-on experience and continuous learning.
- Penetration Testing (Web, Network, Wireless)
- Malware Analysis & Reverse Engineering
- Incident Response & Digital Forensics
- Threat Hunting & OSINT Investigation
- Detection Engineering (Sigma, SPL, KQL)
| Category | Tools / Technologies |
|---|---|
| Offensive Security | Metasploit, Burp Suite, Nmap, SQLMap, Gobuster |
| Defensive Security & SIEM | Splunk, ELK Stack, Zeek, Wazuh |
| Digital Forensics (DFIR) | Autopsy, Volatility, FTK Imager, Ghidra |
| Programming & Security Engineering | Python, C, Bash, PowerShell |
| Cloud & Infrastructure | Docker, Kubernetes, AWS |
| Operating Systems (Internals & Security) | Kali Linux, Ubuntu, Windows Server |
- Designing and hosting CTF challenges (Jeopardy & Attack-Defense style)
- Real-world penetration testing scenarios (Web, Network, Wireless)
- Malware analysis, unpacking, and reverse engineering
- Secure coding and auditing in Rust, Python, and Bash
- Contributing to open-source cybersecurity tools and red team utilities
AAPP‑MART (AI‑Autonomous Attack Path Prediction & Multi‑Agent Red Team Simulation Engine) is an open‑source Python security engine designed for offensive security research, adversarial modeling, and automated risk assessment.
Technology: Python, MITRE ATT&CK, Multi‑Agent Simulation, Graph Analysis, Security Analytics
Official Website: Explore Project
Official Wiki: Documentation
GitHub Repository: Source Code
| Repository | What it Shows |
|---|---|
| security-playbooks | MITRE ATT&CK–based scenarios, detection rules (Sigma, YARA, Suricata), PoCs, labs, and learning material |
| attack-simulator-framework | Simulation framework leveraging MITRE ATT&CK techniques |
- Conducted research in network security and developed new vulnerability scenarios.
- Developed new Python modules for the open-source security tool “AAPP-MART”.
- Published technical research notes on malware reverse engineering and network protocol analysis.
- Performed vulnerability assessments and created Proof of Concept (PoC) exploits in controlled lab environments.
- Designed and hosted CTF challenges adopted by local cybersecurity communities.
Technical research, DFIR notes, malware analysis, and detection engineering write-ups.
- Gist: Code Snippets & PoCs
- Developing Rust-based security tools for automation
- Studying advanced malware analysis and reverse engineering
- Preparing for OSCP certification
- Building new CTF challenges for Red Team simulations
- I am experimenting with threat-hunting automation and SIEM data analysis
- E-mail: Not available
- GitHub: GitHub Profile
- PGP: PGP Public Key


