About

This site is used as an archive of random technical ramblings on various topics that I encounter. All views posted on this blog are my own and not who I work for.

Be mindful and read the disclaimer below.


About me

I have had the fortunate curiosity to install RedHat 7.2 in 2001 and jumped into a vortex that I never got out of. During the day, I work as a professional infrastructure/software engineer. At night, I focus on research and projects.

Here's a playlist I currently like (this changes based on my mood):


Disclaimer

All content on this blog are for informational and educational purposes only. I strongly believe that computer programming, ethical hacking, information security and cyber security in general should be familiar subject to anyone using computers and the internet. Information posted on this blog should be used to understand topics from the defense perspective and in general how to protect yourself from various threat actors. Information on this blog is strictly for educational purposes and should be used ethically.

The entire content has been written on a controlled environment mainly using my own routers, servers, websites, computers and other resources (such as TryHackMe, HackTheBox and VulnHub) they do not contain any illegal activity. I don't promote, encourage, support or excite any illegal activity or hacking without written consent. I want to raise security awareness and inform the general opinion on how to prevent themselves from being a victim of malicious actors. If you plan to use the information for illegal purposes, please leave this blog now. I cannot be held responsible for any misuse of the given information.