Cybersecurity researcher focused on offensive security, detection engineering, and CTF problem solving. Passionate about automation, reverse engineering, and secure system design.
Download ResumeI’m a passionate cybersecurity learner and hands-on practitioner exploring the realms of offensive security, detection engineering, and digital forensics. My journey began with curiosity about how systems break — and gradually evolved into understanding how to defend and strengthen them.
Over time, I’ve been actively building and experimenting with projects like SmartBruteRL, a reinforcement learning–based password prediction tool, and Snapper, a CLI-focused Man-in-the-Middle (MITM) utility for ARP spoofing and packet analysis.
I’ve also participated in CTFs and lab environments such as TryHackMe, Hack The Box, and Metasploitable, where I continually test and refine my practical skills in exploitation, privilege escalation, and network forensics.
My focus right now is on bridging the gap between red teaming and blue teaming — learning how attackers think while also understanding how defenders can detect, respond, and mitigate threats effectively.
Completed foundational cybersecurity concepts, SOC workflows, and practical lab exercises.
Packet capture and analysis for cybersecurity investigations and network event correlation.
Exploit development, payload delivery, and post-exploitation workflows in controlled labs.