About

About

I work in cybersecurity with a focus on understanding how systems fail and how attacks actually work.

Most of my time is spent breaking things in controlled environments, analyzing network traffic, solving CTF challenges, and digging through code that was never meant to be readable.

This blog is basically my public notebook.

Areas I Work In

My interests include:

  • Web exploitation
  • Network traffic analysis
  • Malware analysis
  • Reverse engineering
  • Blue team detection techniques
  • Privilege escalation
  • Security research through CTF challenges

Some days that means analyzing packets in Wireshark.
Other days it means staring at decompiled binaries trying to understand what the original developer was thinking.

Environment

Most work is done on:

  • Arch Linux
  • Linux networking tools
  • security analysis frameworks
  • CTF labs and vulnerable environments

Why This Blog Exists

Security research produces a lot of small discoveries that normally disappear in private notes.

This site exists to:

  • document experiments
  • share technical writeups
  • track my progress in cybersecurity
  • build a personal archive of research

Some posts will be polished writeups.
Others will simply document interesting problems and how they were solved.

Disclaimer

All research and experiments documented here are performed in legal lab environments, CTF platforms, or systems intentionally designed to be tested.