I break things to understand them and play around with functionality.
I’m exploring cybersecurity from both offensive and defensive angles, with a strong focus on how systems are built, how they fail, and how they can be abused or defended.
I enjoy digging beneath the surface — understanding why something works, not just how it is used on the surface.
This profile is a living workspace: labs, notes, experiments, and projects as I learn.
- ๐ด Red Team & offensive security fundamentals
- ๐ต Blue Team concepts & defensive thinking
- ๐ง Malware analysis & reverse engineering (early-stage)
- ๐ Web exploitation & common attack surfaces
- ๐ข Active Directory & Windows internals
- ๐ง Linux systems & privilege escalation
- ๐ต๏ธ OSINT & information gathering
- Prefer hands-on labs over theory-only learning
- Breaking systems to see why they break
- Rebuilding environments to understand authority & flow
- Testing and playing around with systems, software and infrastructure
I’m currently between beginner and intermediate, focusing on building strong fundamentals instead of rushing into advanced techniques.
(Updated from time to time)
- ๐ Working through TryHackMe labs & paths.
- ๐ Exploring how Windows environments are structured and work together.
- ๐ Learning how attackers and defenders think differently.
- ๐ PicoCTF challanges.
Projects I’m comfortable sharing publicly.
Ongoing or private work not yet public.
- “Understand the system before trying to exploit it.”
- “If it breaks, there’s a reason.”
- “Learning sticks when you struggle a bit.”





