IT & Cybersecurity Student
Independent Security Researcher specializing in web application security, network analysis, and ethical hacking. Passionate about identifying vulnerabilities and building secure systems.
I'm a cybersecurity student with a passion for finding website vulnerabilities and strengthening digital security by providing mitigations. My journey began at a young age, from studying all night and trying to break into the industry, all the way to formulating a responsible disclosure that protects users.
With experience in security research, OSINT investigations, and network analysis, I bring a practical understanding of modern threats and mitigation strategies, with an excellence at translating technical concepts into non-technical means, I ensure it is delegated into actionable insights.
Having prior access to commercial digital forensics tools and the ability to perform OSINT techniques by experts, I can collect, analyse, and interpret information and/or data publicly available to support investigations, whilst having awareness of digital footprints and the importance of online privacy.
Currently focused on advancing my skills in Web Application Security, Networking, Machine Learning, and AI through independent research and academic projects.
This is my controlled home lab environment for learning and ethical cybersecurity experimentation. All activities follow strict safety protocols, ethical guidelines, and are performed in isolated networks to prevent unintended consequences.
Key Tools in my arsenal
Safe demonstration of reflected XSS vulnerability on my test web app. Learned about payload encoding and input validation importance.
Gained practical insight on how threat actors set up a phishing page, how it's hosted, and the importance of URL authenticity.
Experimented with the Dynamic Host Configuration Protocol to allow static IP addresses via DHCP reservations.
Deep understanding of Wi-Fi attacks, Bluetooth & IoT vulnerabilities, and the LoRa module (peer-to-peer mesh network) through handsβon experimentation.
Converted old hardware into a headless setup to have an isolated lab environment that can be accessed via SSH only. Learnt many aspects, ranging from diagnosing network failures, configuring access to the server outside LAN, troubleshooting systems, and much more.
Completed security research about cryptography. Concluded insight into RSA being quantum-vulnerable, MD5 hash being vulnerable to rainbow table attacks if not properly salted, and a range of encryption techniques via CyberChef.
Integrated an autonomous agent framework using the dedicated Docker image and external LLM APIs to automate tasks and scheduling.
Performed traffic analysis using Bettercap to understand the importance of HTTPS, HTTP vulnerabilities & Wi-Fi security.
Configured a multi-boot environment with Windows and two Linux distributions for experimentation, self-learning, and feasibility.
Conducted comprehensive vulnerability assessment on a website application, identifying and responsibly disclosing a security flaw, creating proof-of-concept payloads and providing mitigations.
Experimented with a low-interaction simulated honeypot framework made by Evilputer to gain an understanding of the behaviour on the backend.
I'm currently available for security research collaborations, internships, and cybersecurity opportunities. Let's connect!