<About Me />
I'm a Computer Engineering student with a deep passion for cybersecurity and ethical hacking. My journey in tech is driven by curiosity and a desire to understand how systems work at their core.
Currently exploring the fascinating world of reverse engineering and malware analysis, I'm constantly learning new techniques to identify vulnerabilities and strengthen security measures.
I believe in using technology responsibly and contributing to a safer digital world through ethical practices and open-source contributions.
Cybersecurity
Passionate about securing systems and identifying vulnerabilities
Ethical Hacking
Penetration testing and security assessments
Reverse Engineering
Learning to analyze and understand software at a deep level
Malware Analysis
Studying malicious software behavior and patterns
<Skills />
Cybersecurity
Penetration Testing
Web & network security assessments
Ethical Hacking
CTF competitions & vulnerability research
Reverse Engineering
Binary analysis & malware dissection
Malware Analysis
Static & dynamic analysis techniques
Cryptography
Encryption protocols & implementation
Network Security
Firewall config & traffic analysis
Programming & Tools
Python
Scripting, automation & security tools
C/C++
Low-level programming & exploits
Linux/Bash
System administration & scripting
Git & GitHub
Version control & collaboration
SQL
Database management & injection testing
Burp Suite
Web application security testing
Other Skills
Web Development
React, Next.js, Tailwind CSS
API Security
REST API testing & authentication
Docker
Containerization & deployment
OSINT
Open-source intelligence gathering
<Projects />
<Blog & Notes />
Understanding Buffer Overflow Attacks
A deep dive into how buffer overflow vulnerabilities work and how to prevent them
Getting Started with Reverse Engineering
Essential tools and techniques for beginners in reverse engineering
Web Application Security Best Practices
Common vulnerabilities in web applications and how to secure them
Introduction to Malware Analysis
Tools and methodologies for analyzing malicious software safely