About
I work in cybersecurity with a focus on understanding how systems fail and how attacks actually work.
Most of my time is spent breaking things in controlled environments, analyzing network traffic, solving CTF challenges, and digging through code that was never meant to be readable.
This blog is basically my public notebook.
Areas I Work In
My interests include:
- Web exploitation
- Network traffic analysis
- Malware analysis
- Reverse engineering
- Blue team detection techniques
- Privilege escalation
- Security research through CTF challenges
Some days that means analyzing packets in Wireshark.
Other days it means staring at decompiled binaries trying to understand what the original developer was thinking.
Environment
Most work is done on:
- Arch Linux
- Linux networking tools
- security analysis frameworks
- CTF labs and vulnerable environments
Why This Blog Exists
Security research produces a lot of small discoveries that normally disappear in private notes.
This site exists to:
- document experiments
- share technical writeups
- track my progress in cybersecurity
- build a personal archive of research
Some posts will be polished writeups.
Others will simply document interesting problems and how they were solved.
Disclaimer
All research and experiments documented here are performed in legal lab environments, CTF platforms, or systems intentionally designed to be tested.