Second-year CS Student • Security Researcher • Builder

Build perfectly.
Break securely.

I focus on practical security—breaking systems to understand them, then designing defenses that actually work.

Web Security • Blue Teaming • OSINT • Applied Research

Core Skills

What I actually do well.

Cybersecurity & Blue Teaming

• Web app security (OWASP Top 10, exploitation)

• IDS/SIEM setup & tuning (Suricata, Wazuh)

• Log analysis & incident investigation

• Home lab attack–defense simulations

Offensive Foundations

• CTF problem-solving (Web, OSINT, Crypto)

• Custom tooling for exploitation

• Attack vector analysis

OSINT & Digital Forensics

• OSINT-driven investigations

• Blockchain transaction analysis

• Evidence collection workflows

Applied AI in Security

• NLP-driven alert summarisation

• Agent-based security workflows

• LLMs for investigation support

Projects

Concrete work. No fluff.

UniTie

Real-world event management platform designed with security-first thinking (Auth, RBAC, Abuse prevention).

Blockchain Forensics

Platform for transaction graph analysis and OSINT-assisted deanonymisation of wallet clusters.

Agentic Wazuh SOC

AI-assisted SOC using Wazuh and NLP to automate alert triage and reduce analyst fatigue.

Suricata IDS

Deployed and tuned Suricata for network threat detection with custom rulesets.

Endpoint Monitor

Real-time file integrity monitoring system to detect persistence techniques.

Security Tooling

Educational keyloggers, enumeration scripts, and custom exploit tools.

Experimental Lab: CVE-2024-34351

I host intentionally vulnerable apps to demonstrate exploitation vectors. This instance contains a live RCE vulnerability (Prototype Pollution).

Enter Security Lab

Not a specialist in one thing. Not a beginner in many.
I build breadth to find depth—and I document the journey.