Test. Attack. Protect.
That’s what I do.

01_

Manifesto

Part 1
Offense Before Damage

Security is not built on assumptions.

It is built by thinking like an attacker.

Every system fails somewhere.

The difference between compromise and resilience is whether that failure is found by an attacker or by a defender first.

Part 2
Reality Over Theory

I focus on real attack paths, not checklists. Recon, exploitation, post-exploitation, lateral movement, and impact assessment.

Labs, research, and custom tooling form the core of my work. Every test is designed to reflect real-world adversary behavior.

Part 3
Responsibility

Offensive security exists to protect.

Every action is controlled, ethical, and performed in authorized environments.

Break to understand.
Understand to defend.

02_

Who I am

Most of my experience comes from hands-on labs, real projects, and research—where I simulate realistic attack scenarios to uncover weaknesses before they are exploited.

Take a look at my CV from: HERE

03_

Vision

My Vision:
My goal is to think like a real adversary and act like a responsible professional.

I believe modern security requires deep technical understanding, creative attack thinking, and precise execution.

04_

My Projects

I am currently developing a product called BitGuard, a next-generation cybersecurity platform designed to secure sensitive communications and protect personal data from unauthorized access.

The mission is to provide a seamless, end-to-end encrypted messaging experience that combines usability with advanced security features. BitGuard supports multiple encryption methods, session-based authentication, and device verification to ensure that messages remain safe even if a device is compromised. Over time, we aim to expand its capabilities to include real-time secure collaboration, encrypted file sharing, and customizable privacy controls for professional and personal use.

FEATURES:

  • End-to-end encryption: Ensures only intended recipients can read messages.
  • Custom encryption algorithm (BitCrypt): Adds an extra layer of protection beyond standard methods.
  • Session & device security: Protects against unauthorized logins and stolen devices.
  • Intuitive interface: Allows both technical and non-technical users to encrypt, send, and receive messages easily.
  • Cross-platform support: Works on web and desktop environments seamlessly.
05_

Team

It’s just me and my friend Nicat. We handle all development, design, and cybersecurity for our projects ourselves.

We’re open to bringing in new people, but only if they really know their stuff and can add real value to what we’re building.

06_

Career

I’ve spent years building hands-on experience in offensive security, research, and software development.

Most of my work has been in labs and real-world simulations, where I analyze systems, test vulnerabilities, and create custom tools to understand and protect digital environments.

I hold a CompTIA PenTest+ certification and have extensive experience in red teaming, penetration testing, and cybersecurity research.

Alongside practical skills, I focus on building secure, resilient software and continuously learning about emerging threats, attack techniques, and defensive strategies.

Every project I take on is driven by curiosity, experimentation, and a commitment to high-quality, secure solutions.

07_

Get in contact!

Contact Info:
Contact me via instagram: @vsftpd2.3.4

Or you can contact me via email.