Passionate Ethical Hacker and Security Researcher with a deep focus on Red Team Operations, Exploit Development, and Offensive Security. I specialize in building custom tools, developing exploits, and researching vulnerabilities to strengthen defensive postures.
When I'm not breaking systems ethically, I'm tinkering with Linux internals, automating workflows, or competing in CTF challenges. I believe in the philosophy of understanding systems from the ground up—from kernel modules to network protocols.
Currently contributing to security projects at @S1b-Team actively researching new attack vectors and evasion techniques.
int3rceptor
A next-generation HTTP/HTTPS intercepting proxy engineered in Rust and Vue.js, designed for precision debugging, offensive security workflows, and deep traffic inspection.
Built for professionals who demand speed, clarity, and control, int3rceptor blends high-performance network interception with a modern, reactive UI—offering a powerful environment for analyzing, modifying, and replaying web traffic with confidence.
int3rceptor is a high-performance security testing platform designed to rival commercial tools.
⚡ Blazing Fast: Powered by Rust's async engine. 🎨 Modern UI: Real-time Vue 3 interface. 🛠️ Powerful: Intruder, Repeater, Rule Engine, and WebSocket interception.
- ✅ OSCP – Offensive Security Certified Professional (Completed)
- ✅ ARTE – Advanced Red Team Engagement (Certified)
- ✅ CASP+ – CompTIA Advanced Security Practitioner
- 🔄 CEH – Certified Ethical Hacker (In Progress)
Development of custom payloads, OPSEC-safe C2 infrastructure, spear-phishing campaigns, and full-scale adversary emulation. Focused on realistic attack scenarios that help organizations identify and remediate security gaps.
Deep expertise in memory corruption (stack/heap overflows), web vulnerabilities (XSS, RCE, SSRF, IDOR), and privilege escalation techniques across both kernel and userland contexts.
Building automated reconnaissance pipelines, custom offensive tools, and data parsing frameworks for red team operations. Focus on efficiency and reproducibility in security assessments.
Experienced in static and dynamic analysis of binaries, solving pwn challenges, and researching both public and private CVEs. Comfortable with x86/x64 assembly and low-level debugging.
Conducting deep security audits of modern web applications, exploiting OWASP Top 10 vulnerabilities, WAF bypass techniques, and abusing REST/GraphQL APIs.
Creating custom packers and crypters, implementing AV/EDR evasion techniques, sandbox detection, process injection, and API hooking for advanced persistence mechanisms.
Gathering and analyzing threat intelligence, tracking adversary TTPs, and leveraging OSINT methodologies for reconnaissance and target profiling.
Integrating security into the development lifecycle, performing secure code reviews, and building security-first infrastructure with automation and monitoring.
I breathe terminal. Linux is not just an OS—it's a way of thinking.
From bare-metal installations to kernel hardening, I thrive in the deep internals of Linux systems. Whether it's writing custom systemd services, compiling kernels, or optimizing network stacks, I enjoy every layer of the stack.
Favorite Distros: Arch Linux 🖤 | Debian | Kali | NixOS
🔐 Currently building and contributing to internal security tools at @S1b-Team
🛠️ Custom payload generators, enumeration scripts, and reconnaissance automation tools are part of my daily workflow
🧪 Actively researching new exploitation techniques and publishing findings responsibly
🐧 Maintaining dotfiles-s1b - Complete Arch Linux configuration with DWM, custom themes, and development environment
Security Engineering Telemetry · Red Team Automation · S1b-Team Collaboration
CI-driven GitHub REST telemetry (stars, public repos, forks, top languages) feeds generated/banner.template.svg and writes the rendered output to generated/banner.svg via scripts/update-banner.js, orchestrated by the GitHub Actions workflow at .github/workflows/update-profile-banner.yml. This automation keeps the banner as the single, verifiable source of truth.
"The quieter you become, the more you can hear." — Kali Linux motto



