- Focused on Red Team tactics and offensive security workflows;
- Exploring bug bounty methodologies and practical web exploitation;
- Open to discussions around security automation, OSINT, and tooling;
- Primary environment: Arch Linux (for better or worse);
- Contact: hi@x0r.xyz;
const rad1ant = {
code: {
languages: ["Python", "JavaScript", "Shell Scripting", "PHP"],
frameworks: ["React.js", "Node.js", "Express.js"],
},
tools: {
security: ["Burp Suite", "Wireshark", "John the Ripper", "Nmap", "Metasploit"],
virtualization: ["Docker", "KVM", "VMware"],
cloud: ["AWS", "Azure", "Heroku"],
others: ["Git", "rclone"],
},
architecture: {
styles: ["microservices", "event-driven", "design system pattern"],
security: ["secure web applications", "multi-factor authentication", "encryption"],
},
cybersecuritySkills: {
areas: ["Pentesting", "Security Audits", "Networking", "API Vulnerability Discovery", "Cybersecurity Awareness"],
methods: ["Vulnerability Assessment", "Threat Modeling", "Incident Response"],
},
}
π± My Wakatime Data
TypeScript 32 mins βββββββββββββββββββββββββ 62.75 %
CSS 7 mins βββββββββββββββββββββββββ 13.68 %
JavaScript 4 mins βββββββββββββββββββββββββ 09.05 %
TOML 4 mins βββββββββββββββββββββββββ 08.65 %
Markdown 2 mins βββββββββββββββββββββββββ 05.69 %