- Focused on Red Team tactics and offensive security workflows;
- Exploring bug bounty methodologies and practical web exploitation;
- Open to discussions around security automation, OSINT, and tooling;
- Primary environment: Arch Linux (for better or worse);
- Contact: [email protected];
const rad1ant = {
code: {
languages: ["Python", "JavaScript", "Shell Scripting", "PHP"],
frameworks: ["React.js", "Node.js", "Express.js"],
},
tools: {
security: ["Burp Suite", "Wireshark", "John the Ripper", "Nmap", "Metasploit"],
virtualization: ["Docker", "KVM", "VMware"],
cloud: ["AWS", "Azure", "Heroku"],
others: ["Git", "rclone"],
},
architecture: {
styles: ["microservices", "event-driven", "design system pattern"],
security: ["secure web applications", "multi-factor authentication", "encryption"],
},
cybersecuritySkills: {
areas: ["Pentesting", "Security Audits", "Networking", "API Vulnerability Discovery", "Cybersecurity Awareness"],
methods: ["Vulnerability Assessment", "Threat Modeling", "Incident Response"],
},
}π± My Wakatime Data
TypeScript 5 hrs 23 mins βββββββββββββββββββββββββ 54.57 %
HTML 2 hrs 17 mins βββββββββββββββββββββββββ 23.14 %
JavaScript 47 mins βββββββββββββββββββββββββ 08.05 %
TOML 35 mins βββββββββββββββββββββββββ 06.06 %
CSS 20 mins βββββββββββββββββββββββββ 03.49 %



