Skills

Security skills grouped by how I use them.

$ nmap -sC -sV target$ ffuf -w wordlist$ burp intercept on

Offensive Security

Web, API, and privilege escalation

Burp Suite, Nmap, Metasploit, SQLMap, Hashcat, Hydra, ffuf, Gobuster, web exploitation, API testing, SQL injection, privilege escalation, and internal pivoting.

$ tshark -r capture.pcap$ tcpdump -i eth0$ iptables -L

Network Security

Packets, protocols, and infrastructure

Wireshark, TShark, tcpdump, TCP/IP, DNS, NAT, iptables, routing and switching, packet analysis, SYN flood detection, and DoS traffic analysis.

$ python features.pycsv labels generatedattack traffic reviewed

Research & Detection

Dataset engineering and attack analysis

Wireless security research, malicious and benign traffic generation, network attack analysis, feature extraction, lab datasets, and detection-focused experimentation.

$ ghidra analyze samplefunctions reviewedexecution logic mapped

Reverse Engineering

Static analysis and malware behavior

Ghidra, static malware analysis, WannaCry ransomware analysis, function review, behavior study, and execution-flow reasoning.

$ aws security specialty preparchitecture notesdetection patterns

Cloud Security

AWS security growth area

AWS Security, cloud security engineering, threat detection, security architecture, and preparation for AWS Certified Security - Specialty (SCS-C02).

$ python lab_tool.py$ bash setup.sh$ arm64 parse instruction

Programming & Systems

Automation, labs, and low-level concepts

Python, Bash, C, C++, C#.NET exposure, Kali Linux, Parrot OS, Linux administration, Windows, VirtualBox, Raspberry Pi, ARM64 Linux VM, and ARM64 assembly concepts.