Computer Science Student | Cybersecurity Enthusiast
Welcome to my digital fortress! 🚀 I'm passionate about computer security, exploring cutting-edge technologies, and staying ahead of the latest cybersecurity trends.
📚 I'm currently pursuing my degree in computer science with a laser focus on cybersecurity. My academic journey is driven by an insatiable curiosity about digital protection and threat mitigation.
💻 I'm passionate about all things related to computer security - from analyzing the latest attack vectors to implementing robust defense mechanisms that keep digital assets safe.
🌐 I love exploring new technologies and staying updated with the rapidly evolving cybersecurity landscape. Every day brings new challenges, and I'm committed to continuous learning and adaptation.
Core expertise in digital security principles, threat analysis, and protection strategies
Deep understanding of networking protocols, traffic analysis, and network infrastructure protection
Proficient in encryption algorithms, hashing functions, and cryptographic protocol implementation
Experienced with OWASP Top 10, web vulnerability assessment, and secure coding practices
Skilled in penetration testing tools including Metasploit, Wireshark, and vulnerability scanners
Knowledge of mobile platform security, app analysis, and mobile threat detection
Active participant in Capture The Flag events, with experience in various challenge categories
Proficient in Python, C/C++, and scripting languages for security automation and CTF challenges
Proficient in binary analysis, reverse engineering, and exploitation techniques for securing applications
Educational steganography application enabling users to hide and reveal messages within images using steganographic techniques. Includes optional password-based encryption for enhanced message confidentiality.
Educational project showcasing how to configure a system to trust SSL/TLS certificates issued by a custom Certificate Authority (CA). Designed in a controlled environment to explore the principles of Public Key Infrastructure (PKI) and the digital certificate trust chain.
Educational implementation of asymmetric encryption, demonstrating secure message exchange through public/private key cryptography. Developed to deepen understanding of cryptographic primitives, key management, and secure programming practices in a systems-level language.
Interested in cybersecurity discussions, collaborative projects, or CTF competitions? I'd love to connect and share knowledge!