Mastering the tools of the trade, one skill at a time
Crafted solutions blending creativity, security, and cutting-edge technology
Red Team Cheatsheet
Curated offensive security cheatsheets and tools for red teamers.
Recon & Vulnerability
All-in-one Python toolkit for automated recon and vulnerability scanning.
Password Analyzer
Instantly checks password strength and gives security tips.
Healthcare Portal
Book appointments, view treatments, and contact doctors online.
Color Tools & Quiz
Explore, pick, and quiz yourself on 200+ colors and gradients.
Interactive Terminal
A portfolio site with terminal-like commands and interface.
Continuous learning and professional development in cybersecurity
eLearnSecurity
Junior Penetration Tester Certification
Practical penetration testing certification focusing on network attacks, web application security, and real-world hacking scenarios.
Security Blue Team
Advanced Threat Intelligence Training
Specialized training in dark web monitoring, threat intelligence gathering, OSINT techniques, and anonymous digital operations.
Fortinet Training
Certified Fundamentals Examination
Fundamentals in Cybersecurity covering network security foundations, threat protection, and Fortinet FortiGate security architecture.
CTf Platform
Cybersecurity Learning Platform
Actively learning cybersecurity fundamentals, completing challenge rooms, and building practical skills in ethical hacking and penetration testing.
Competitions
Capture The Flag Participant
Actively participating in cybersecurity CTF competitions to practice and improve skills in web exploitation, forensics, reverse engineering, and cryptography.
Infrastructure
AWS & Cloud Security Focus
Preparing for AWS security certifications with focus on cloud infrastructure security, identity management, and secure cloud architecture design.
Monitor critical security threats and vulnerabilities in real-time
CVE-2024-50379 | Apache Log4j 2.x
Remote code execution vulnerability in Apache Log4j allows unauthenticated attackers to execute arbitrary code through specially crafted JNDI lookups.
CVE-2024-49876 | WPS Hide Login Plugin v1.9.x
SQL injection vulnerability in WPS Hide Login plugin allows authenticated users to perform database queries with elevated privileges.
CVE-2024-48791 | Django Framework 4.0-4.2
Stored XSS vulnerability in Django ORM query results allows attackers to inject malicious script code into user sessions.
APT-LAZARUS-001 | Financial Institutions Targeted
Lazarus APT group conducting sophisticated phishing and malware campaign targeting banking institutions across APAC region.
CVE-2024-47826 | OpenSSH 9.0-9.5
Logic flaw in SSH key authentication allows attackers to bypass authentication checks under specific network conditions.
Data sourced from NVD, CISA, Shodan, and Security Research Communities. Filter threats by severity level above.
Have a project in mind? Want to collaborate? Drop me a message and let's discuss how we can work together.