🔐
Network Security
Analyzing network traffic, identifying intrusion patterns, and securing infrastructure. Comfortable with packet analysis, port scanning, and network mapping across different topologies.
Packet Analysis
Intrusion Detection
Port Scanning
Firewall Config
82% Proficiency
🎯
Ethical Hacking
Penetration testing methodologies, exploit research, and controlled vulnerability exploitation in authorized environments.
78% Proficiency
Pen Testing
Exploit Dev
Recon
🌐
Web App Security
Testing against OWASP Top 10, identifying injections, broken auth, and CSRF vulnerabilities.
75%
🐍
Python Scripting
Custom security tools, automation scripts, scanners, and data analysis for both offensive and defensive use cases.
70%
💠
Bash Automation
Shell scripting for security workflows, log parsing, system auditing, and automated enumeration pipelines.
68%
📊
Risk Assessment & Mitigation
Evaluating threat landscapes, mapping attack surfaces, identifying risk vectors, and proposing actionable mitigation strategies aligned with security best practices.
Threat Modeling
Attack Surface
Risk Frameworks
72% Proficiency
🔬
Digital Forensics
Disk imaging, memory analysis, log forensics, and evidence collection using standard forensic methodologies for incident response.
Memory Analysis
Log Forensics
Disk Imaging
60% Proficiency
🐧
Linux OS
Daily driver for security work. Kali Linux, file systems, permissions, process management and CLI tools.
80%
🔑
Cryptography
Symmetric/asymmetric encryption, hashing algorithms, PKI, and applying cryptographic principles to security design.
63%
🚩
CTF Competitions
Active on TryHackMe — sharpening skills in real-world-style scenarios across forensics, web, crypto, and pwn.
76%