Cybersecurity & Ethical Hacking Expert

Offensive & Defensive Threat Hunting Red Teaming Vulnerability Research

I am a cybersecurity expert specializing in ethical hacking, digital defense, and vulnerability assessment. My primary focus is on proactively identifying and mitigating risks before they can be exploited by malicious actors. I am strongly committed to safeguarding digital assets and anticipating adversarial tactics to remain one step ahead.

In addition to my cybersecurity expertise, I have a solid background in software development. I design and implement Python-based tools for automation, threat intelligence, and SIEM optimization. By integrating security and software engineering, I deliver efficient, resilient, and intelligent defense solutions.

I've been pursuing this journey with passion since 2022.

Terminal — secwexen@kalilinux: ~/system-audit
┌──(secwexen㉿kalilinux)-[~/system-audit]
└─$ sudo lynis audit system
[sudo] password for secwexen: **********

[INFO] Starting system audit (lynis 3.1.0)...
[] Core system checks completed
[] Network interfaces analyzed: eth0, wlan0
[] Security controls detected: nftables, apparmor, fail2ban

[INFO] Vulnerabilities and warnings:
    ├─ CVE-2024-6387: OpenSSH regreSSHion (system vulnerable)
    ├─ Kernel outdated: 6.5.0 (latest stable: 6.8.x)
    └─ SSH PasswordAuthentication enabled (weak security)

[] Hardening actions applied:
    ├─ SSH: PasswordAuthentication disabled
    ├─ Fail2ban: ssh jail enabled and restarted
    └─ Sysctl: net.ipv4.conf.*.rp_filter set to strict

[] Firewall rules verified (nftables active, inbound default deny)
[] AppArmor profiles enforced
[] AIDE integrity database updated
[] Report saved to /var/log/lynis-report.dat

Focus Areas

Offensive Security

  • Penetration Testing (Web, Network, Wireless)
  • Vulnerability assessment & exploit development
  • Malware analysis & reverse engineering

Defensive Security

  • Incident response & digital forensics
  • Threat hunting & OSINT investigations
  • SIEM automation & detection engineering

Software & Systems

  • Secure development (Rust, Python, Bash, PowerShell)

Skills Matrix

Offensive Security

Metasploit, Burp Suite, Nmap, SQLMap, Gobuster

Defensive & SIEM

Splunk, ELK Stack, Zeek, Wazuh.

Digital Forensics (DFIR)

Autopsy, Volatility, FTK Imager, Ghidra

Programming & Scripting

Python, Bash, PowerShell

Cloud & Infrastructure

Docker, Kubernetes, AWS

Operating Systems

Kali Linux, Ubuntu, Windows Server

OSINT Tools

Maltego, theHarvester, SpiderFoot, Shodan

Selected Projects

AAPP‑MART | AI-Autonomous Attack Path Prediction & Multi‑Agent Red Team Simulation Engine

AAPP‑MART is an open‑source Python security engine designed for offensive security research, adversarial modeling, and automated risk assessment.

Focus:
Adversary emulation, detection validation, attack path analysis
Tech:
Python, MITRE ATT&CK, Multi‑Agent Simulation, Graph Analysis
Visit GitHub Repository

Achievements & Contributions

  • Research in network security; developed new vulnerability scenarios
  • Built new Rust modules for AAPP-MART
  • Published technical notes on malware reverse engineering & protocol analysis
  • Performed vulnerability assessments in lab and authored PoC exploits
  • Designed CTF challenges adopted by local security communities

Current Work

  • Rust-based security tooling for automation
  • Advanced malware analysis & reverse engineering
  • OSCP preparation & HackTheBox labs
  • New CTF challenges for red team simulations
  • Threat hunting automation & SIEM data analytics

Certification & Learning Path

Planned Certifications

  • OSCP — Offensive Security Certified Professional
  • CISSP — Information Systems Security
  • CompTIA Security+ — Foundational knowledge

Academic Focus

  • Secure systems design, malware analysis, incident response
  • MITRE ATT&CK & NIST frameworks — lab applications
  • Continuous learning through CTFs & collaborative projects

Contact & Professional Links

Contact

E-mail:
Coming Soon

Code of Ethics & Legal Disclaimer

Code of Ethics

  • All research, simulations, and tools are conducted in controlled environments for learning and defensive purposes.
  • Responsible disclosure is strictly followed for any vulnerabilities discovered.
  • Tools are not intended for illegal use; misuse is strictly prohibited.
  • The goal is to enhance detection, improve defenses, and advance security research.

Legal Disclaimer

  • All materials are provided solely for educational and defensive security purposes, and users are fully responsible for their own actions.
  • All content is provided "as-is" without any warranties; I make no guarantees regarding accuracy, functionality, or suitability for any particular purpose.
  • By accessing or using the information and materials provided here, you agree to use them responsibly, ethically, and in compliance with all applicable laws.