Cybersecurity & Ethical Hacking Expert
I am a cybersecurity expert specializing in ethical hacking, digital defense, and vulnerability assessment. My primary focus is on proactively identifying and mitigating risks before they can be exploited by malicious actors. I am strongly committed to safeguarding digital assets and anticipating adversarial tactics to remain one step ahead.
In addition to my cybersecurity expertise, I have a solid background in software development. I design and implement Python-based tools for automation, threat intelligence, and SIEM optimization. By integrating security and software engineering, I deliver efficient, resilient, and intelligent defense solutions.
I've been pursuing this journey with passion since 2022.
┌──(secwexen㉿kalilinux)-[~/system-audit] └─$ sudo lynis audit system [sudo] password for secwexen: ********** [INFO] Starting system audit (lynis 3.1.0)... [✓] Core system checks completed [✓] Network interfaces analyzed: eth0, wlan0 [✓] Security controls detected: nftables, apparmor, fail2ban [INFO] Vulnerabilities and warnings: ├─ CVE-2024-6387: OpenSSH regreSSHion (system vulnerable) ├─ Kernel outdated: 6.5.0 (latest stable: 6.8.x) └─ SSH PasswordAuthentication enabled (weak security) [✓] Hardening actions applied: ├─ SSH: PasswordAuthentication disabled ├─ Fail2ban: ssh jail enabled and restarted └─ Sysctl: net.ipv4.conf.*.rp_filter set to strict [✓] Firewall rules verified (nftables active, inbound default deny) [✓] AppArmor profiles enforced [✓] AIDE integrity database updated [✓] Report saved to /var/log/lynis-report.dat
Focus Areas
Offensive Security
- Penetration Testing (Web, Network, Wireless)
- Vulnerability assessment & exploit development
- Malware analysis & reverse engineering
Defensive Security
- Incident response & digital forensics
- Threat hunting & OSINT investigations
- SIEM automation & detection engineering
Software & Systems
- Secure development (Rust, Python, Bash, PowerShell)
Skills Matrix
Offensive Security
Metasploit, Burp Suite, Nmap, SQLMap, Gobuster
Defensive & SIEM
Splunk, ELK Stack, Zeek, Wazuh.
Digital Forensics (DFIR)
Autopsy, Volatility, FTK Imager, Ghidra
Programming & Scripting
Python, Bash, PowerShell
Cloud & Infrastructure
Docker, Kubernetes, AWS
Operating Systems
Kali Linux, Ubuntu, Windows Server
OSINT Tools
Maltego, theHarvester, SpiderFoot, Shodan
Selected Projects
AAPP‑MART | AI-Autonomous Attack Path Prediction & Multi‑Agent Red Team Simulation Engine
AAPP‑MART is an open‑source Python security engine designed for offensive security research, adversarial modeling, and automated risk assessment.
Achievements & Contributions
- Research in network security; developed new vulnerability scenarios
- Built new Rust modules for AAPP-MART
- Published technical notes on malware reverse engineering & protocol analysis
- Performed vulnerability assessments in lab and authored PoC exploits
- Designed CTF challenges adopted by local security communities
Current Work
- Rust-based security tooling for automation
- Advanced malware analysis & reverse engineering
- OSCP preparation & HackTheBox labs
- New CTF challenges for red team simulations
- Threat hunting automation & SIEM data analytics
Certification & Learning Path
Planned Certifications
- OSCP — Offensive Security Certified Professional
- CISSP — Information Systems Security
- CompTIA Security+ — Foundational knowledge
Academic Focus
- Secure systems design, malware analysis, incident response
- MITRE ATT&CK & NIST frameworks — lab applications
- Continuous learning through CTFs & collaborative projects
Contact & Professional Links
Professional Links
Contact
Code of Ethics & Legal Disclaimer
Code of Ethics
- All research, simulations, and tools are conducted in controlled environments for learning and defensive purposes.
- Responsible disclosure is strictly followed for any vulnerabilities discovered.
- Tools are not intended for illegal use; misuse is strictly prohibited.
- The goal is to enhance detection, improve defenses, and advance security research.
Legal Disclaimer
- All materials are provided solely for educational and defensive security purposes, and users are fully responsible for their own actions.
- All content is provided "as-is" without any warranties; I make no guarantees regarding accuracy, functionality, or suitability for any particular purpose.
- By accessing or using the information and materials provided here, you agree to use them responsibly, ethically, and in compliance with all applicable laws.