// story
My journey into cybersecurity didn't start with a course or a degree — it started with curiosity. I wanted to know how systems break before I could understand how to build them. That mindset has shaped everything I do.
I began as a complete beginner, learning through free resources and building small tools just to see how things worked. Over time that evolved into serious hardware hacking, RF exploitation, and offensive security research. Every project I've built — from a Subdomain Enumeration Engine to a cryptographic Password Vault — exists because I wanted to understand the attack surface, not just defend it.
At IEEE HIT, leading 5+ technical events taught me that great security work isn't just technical — it's about communication, coordination, and making complex ideas accessible. I bring the same clarity to my code.
Outside of hacking, I practice CTFs on TryHackMe and HackTheBox, analyze malware samples, and document what I learn. I believe the best security engineers are perpetual students — always one step behind the attacker, always trying to close the gap.