Passionate cybersecurity professional specializing in penetration testing and vulnerability assessment. Active CTF player and security researcher dedicated to making the digital world safer.
$ whoami
> Penetration Tester | CTF Player | Security Researcher
> "Breaking things to make them stronger"- π Specializing in Web Application & Network Penetration Testing
- π© Active CTF player on HackTheBox, TryHackMe, and CTFtime
- π Bug bounty hunter finding vulnerabilities to help secure applications
- π Constantly learning and sharing cybersecurity knowledge
- π» IT enthusiast exploring the latest security tools and techniques
Berpengalaman pada pengujian aplikasi web: authentication, authorization, session management, input validation, file upload, dan API security. Berminat pada bug hunting (responsible disclosure), threat modeling, dan penguatan pipeline CI/CD terhadap secret leakage. Prefer bekerja di lingkungan yang aman/terisolasi (Docker/VM) dan selalu mengikuti etika pen-test.
- Web App Testing: OWASP Top 10, XSS, SQLi, CSRF, IDOR, SSRF, RCE (analisis & mitigasi)
- Authentication & Authz: session fixation, JWT, password flows, SSO assessment
- API Security: API endpoints audit, rate limiting, token misuse, IDOR pada API
- Recon & Scanning: passive/active recon, subdomain enumeration, dirb, fuzzing
- Forensics & Remediation: log analysis, incident triage, secret rotation
- Coding/Automation: scripting untuk PoC & scanner (Python / Bash), CI pipelines
- Burp Suite (Professional / Community workflows)
- OWASP ZAP, Nmap, Nikto
- sqlmap, ffuf, dirbuster, wfuzz
- Gitleaks, TruffleHog, git-secrets
- Docker, Ghidra (untuk reverse engineering sederhana), Wireshark
- Python (requests, BeautifulSoup), Node.js (simple tooling)
- π Web Application Security (OWASP Top 10)
- π Network Security & Infrastructure Testing
- π Social Engineering & OSINT
- π Cryptography & Password Cracking
- π± Mobile Application Security
- βοΈ Cloud Security (AWS, Azure)
- π Advanced exploitation techniques
- βοΈ Cloud security and container security
- π€ AI/ML security and adversarial attacks
- π± iOS/Android application security
"The only truly secure system is one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards." - Gene Spafford
