An autodidact programmer obsessed with cybersecurity — studying systems, vulnerabilities, and exploring artificial intelligence. I use this place to publish CTF writeups, document projects, and share notes from my ongoing hands-on learning journey.

My focus areas include linux, networking, ethical hacking, Python automation, and practical security research. Most of what I learn is distilled into clear walkthroughs and tools that others can experiment with themselves.

I also share tutorials and demonstrations on YouTube , where I break down cybersecurity concepts into practical, beginner-friendly lessons.

You can follow my ongoing progress and CTF activity across the platforms below:

This site serves as a growing knowledge log — everything shared here is something I’ve tested, practiced, or actively studied.

Download résumé

PGP Public Key

-----BEGIN PGP PUBLIC KEY BLOCK----- Comment: User ID: [email protected] <[email protected]> Comment: Valid from: 6/28/2025 11:46 AM Comment: Type: 255-bit EdDSA Comment: Usage: Signing, Encryption, Certifying User IDs Comment: Fingerprint: 6B75FB142C45756BDDE6D6B71D3F2451BEAA03FF mDMEaF+IqxYJKwYBBAHaRw8BAQdADoTn82VvBjMqKz95rBxSkDnNfsGo4tXohIJb 0yEgp2y0MXJhaHVsLmluZm9zZWNAcHJvdG9uLm1lIDxyYWh1bC5pbmZvc2VjQHBy b3Rvbi5tZT6I0QQTFgoAgwWCaF+IqwMLCQcJkB0/JFG+qgP/RRQAAAAAABwAIHNh bHRAbm90YXRpb25zLm9wZW5wZ3Bqcy5vcmdPmZxB+lkwCo4me7n2nTbWNFF6zrWd x6A4UruqQXsF/QMVCggEFgACAQIZAQKbAwIeARYhBGt1+xQsRXVr3ebWtx0/JFG+ qgP/AAC8sQEA0/8ruEXPE89jXKBz18jX6WtyEg+kUGvE1AfWQavoORUBANOepOGb Y5VMBwBKyNq9+A8frzwfODEYzcQXUxagBzELuDgEaF+IqxIKKwYBBAGXVQEFAQEH QB+AHxFsZ+PjwXalNvuO+ZbayIh9AGM03rT/okqeh9p4AwEIB4i+BBgWCgBwBYJo X4irCZAdPyRRvqoD/0UUAAAAAAAcACBzYWx0QG5vdGF0aW9ucy5vcGVucGdwanMu b3JnRw95lt7nm4lLA6LZYECKepEm5wNH20GkebL5ED8zj2cCmwwWIQRrdfsULEV1 a93m1rcdPyRRvqoD/wAACQcA/0aikxmLIW1y9Di0lpvQEnkj1jd7P7BrHmlTxKnB cJ1qAQDdgbdmQ7R5UQqp9zbB6rzKn3xiiDaHYvKiam7zXZ0JDw== =lxN6 -----END PGP PUBLIC KEY BLOCK-----