All projects and demonstrations in this portfolio are for educational and ethical cybersecurity research only.
Every technique and tool was used legally within approved environments, adhering to ethical hacking principles,
legal regulations, and responsible disclosure practices. Unauthorized use of these methods on systems without
explicit permission is illegal and strictly discouraged. Always follow legal guidelines and obtain proper
authorization before conducting security assessments.
CompTIA Security+ | Google Cybersecurity | Leveld SOC Analyst | THM SOC Level 1 |
![]() |
![]() | ![]() |
![]() |