Iβm learning and practicing Red Teaming and Penetration Testing, focusing on understanding how real-world attacks work and explaining them in a simple and friendly way.
- π§ Threat Modeling & Adversary Tactics
- π Security Assessment Frameworks & Methodologies
- π Application & Network Security Architecture
- π Vulnerability Research & Exploitation Techniques
- π§ Linux & Kali Linux
- π MITRE ATT&CK & Cyber Kill Chain
βοΈ Red Team Operations β Advanced Adversary Simulation & Threat Emulation
π‘οΈ Penetration Testing β Web, Network, API, Cloud, and Mobile Security
π Bug Bounty Hunting β Ethical Hacking & Vulnerability Identification
π Social Engineering & OSINT β Phishing Campaigns & Attack Simulation
Hack to Learn, Learn to Hack π
Security is a Journey, Not a Destination π
| π‘οΈ Pentesting | π§ Exploits & Dev | π Reconnaissance |
|---|---|---|
| π₯οΈ Operating Systems |
|---|
π GitHub β’ π Facebook β’ π¬ Telegram
β Always learning. Always improving.




