mindmap
root{{Daxxtropezz}}
FE)Frontend(
React
Typescript
Javascript
Flutter
FlutterFlow
Figma
BE))Backend((
Java
Python
C++
C#
Dart
DB)Databases(
MySQL
Supabase
Firebase
Redis
TO)Tools and DevOps(
JIRA
Git and GitHub
Docker
Linux
VS Code
Wireshark
Nmap
Bloodhound
Burp Suite
OFF))Offensive Security((
Red Team Operations
Adversary Emulation
Engagement Planning
Rules of Engagement
Reconnaissance
OSINT
Footprinting
Social Engineering
Vulnerability Discovery
Web Application Testing
Network Scanning and Enumeration
Service Version Discovery
Exploitation
Manual Exploitation Techniques
Exploit Development
Privilege Escalation
Exploitation Frameworks
Metasploit
Cobalt Strike
Post-Exploitation
Lateral Movement
Persistence
Credential Harvesting
Bloodhound Usage
Offensive Tooling and Techniques
Nmap Scripts
Burp Extensions
Custom Recon Scripts
Payloads and Stagers
Reporting and Remediation Guidance
Evidence Collection
Actionable Remediation
Active Directory Pentesting
AD Reconnaissance
LDAP Enumeration
Domain Enumeration
Kerberoasting
AS-REP Roasting
DNS and SRV Records
AD Attack Techniques
Pass-the-Hash
Pass-the-Ticket
Overpass-the-Hash
Golden Ticket
Lateral Movement via AD
AD Tooling
Bloodhound
Mimikatz
CrackMapExec
Impacket
Responder
AD Post-Exploitation
Domain Persistence
Abusing GPOs and Scheduled Tasks
ACL and Privilege Misconfiguration Abuse
Web Pentesting
Recon and Mapping
Subdomain Discovery
Virtual Host Discovery
Content Discovery
Common Vulnerabilities
SQL Injection
Cross Site Scripting
Cross Site Request Forgery
Server Side Request Forgery
Local File Inclusion
Remote File Inclusion
Insecure Direct Object References
Authentication and Authorization Bypass
Parameter Tampering
Testing Techniques
Manual Burp Testing
Automated Scanners
Fuzzing and Input Manipulation
Source Review and Dynamic Analysis
Web Tooling
Burp Suite
OWASP ZAP
SQLMap
Nikto
wfuzz
CL)Cloud Skills(
AWS
Azure
GCP
Kubernetes
Docker
Terraform
CI CD
Serverless
VPC and Networking
IAM and Secrets
S3 and Cloud Storage
RDS and Cloud Databases
Observability and Logging
SP)Specialized Skills(
Secure Coding Awareness
API Security Testing
Authentication and 2FA Testing
Threat Modeling attacker POV
Security Automation offensive tooling
For professional inquiries, collaboration opportunities, or technical discussions
🔴 Red Teamer — Offensive security specialist (CRTA, CEH) with expertise in ethical hacking, adversary emulation, OWASP Top 10 exploitation, and evasion techniques
🔐 Cybersecurity — Penetration Testing, Vulnerability Management, Risk Assessment, Social Engineering, InfoSec Analysis
🤖 AI & ML — Python, Deep Learning, NLP, Computer Vision, Generative AI, Data Analysis & Visualization
📦 DevSecOps & Cloud — CI/CD with Docker, Kubernetes, Nginx, AWS, Linode, Cloud Security & Storage
⚙️ Automation — Python & Bash scripting, Linux, Debugging, Code Review, Data Validation
🧠 Fullstack Developer — Vue.js, React, TypeScript, JavaScript, Laravel, shadcn, TailwindCSS, Inertia.js, RESTful APIs, SQL/NoSQL
Click the icon badges to view more information about the badge
To maintain high security standards across development, and integrates automated vulnerability testing within its CI/CD pipeline.
- Security Testing Frameworks: OWASP ZAP, Bandit (Python), and npm audit for dependency checks
- Continuous Integration: GitHub Actions run automated scans on each push or pull request
- Coverage: SQL Injection, XSS, CSRF, insecure authentication, and dependency vulnerabilities
- Reports: Detailed vulnerability reports are generated to guide secure code fixes
- Detects and prevents common web application vulnerabilities early
- Promotes secure development practices across all repositories
- Builds trust by ensuring continuous security validation
|
|
|
|
|
|
|
|
|
- 🏢 I'm currently working on Artificial Intelligence, Machine Learning, Oracle, Red Teaming, & Ethical Hacking 🧑🏻💻
- ☑️ Fun fact: I think I'm funny 🐦⬛















