Network Security
Mastery of router configuration, VPNs, DNS adjustments, and firewall rules (UFW, Fail2Ban). I regularly perform internal audits, I scan for vulnerabilities using tools like Nmap, Wireshark, ZAP and ensure segmentation of sensitive networks. I prioritize hardening both consumer-grade and VPS-based infrastructures.
Data Security
Encryption of internal/external partitions, secure file transfers, backup strategies, and data recovery from formatted drives. I apply integrity checks and work with hash validation.
Endpoint & System Security
OS hardening on Linux and Windows, VM use, reducing attack surface, and managing user privilege separation.
Mobile & Social Media Security
Risk identification, privacy enhancement, and user awareness campaigns across popular platforms. I secure mobile systems against data leaks and apply secure authentication policies.
OSINT
Proficient with Sherlock, Maltego, Censys, Shodan, Google Dorking. I conduct investigations based solely on publicly available data, always within legal and ethical boundaries.
Ethical Hacking
I design and execute controlled simulations to test systems, using tools like Hydra and tool similar slowloris other exemple I use wifi and bluetooth hacking, credential stuffing techniques in lab environments only. My work includes vulnerability enumeration, phishing scenario creation, and defense bypass analysis always for educational and defensive purposes. My philosophy is rooted in the "gray hat with black" approach: knowledge for defense, not destruction.
Development & Automation
HTML and Python projects designed with AI support. I create secure automation scripts, web interfaces, and data analysis tools with a focus on usability and safety. I also use Kotlin and Android Studio to create android apps and C++ language for create windows (.exe) software and tools.
Languages
I have a B1 level in english to speak in person and C1 in writing, for example for cybersecurity.