๐ Currently working on: Penetration testing, vulnerability assessment, and incident response to secure systems and applications.
๐ค Looking to collaborate on: Cybersecurity projects, ethical hacking, and threat analysis.
๐ Currently learning: Advanced Active Directory security, system administration best practices, and CTF challenges.
๐ฌ Ask me about: Penetration testing, Linux administration, and real-time threat monitoring.
๐ Fun fact: I enjoy competing in Capture the Flag (CTF) challenges to sharpen my hacking skills!
Cybersecurity enthusiast, ethical hacker, and red teamer.
Windows, Linux (Debian), Python, Bash, Hacking Tools, Injections, Scripting
- Poland
Pinned Loading
-
CTF-File-Upload
CTF-File-Upload PublicExplore security nuances with File Comparator CTF Challenge. This Flask-based web app invites CTF enthusiasts to navigate file uploads, hashing, and comparisons. Uncover vulnerabilities, test your โฆ
HTML 1
-
-
keybolt-ransomware
keybolt-ransomware PublicKeyBolt is an advanced ransomware application that encrypts target files on the victim's system and securely transmits the decryption keys to a remote server, utilizing strong encryption algorithmsโฆ
C
Something went wrong, please refresh the page to try again.
If the problem persists, check the GitHub status page or contact support.
If the problem persists, check the GitHub status page or contact support.