π Hello, I'm TheMrM!
I am a Cybersecurity Enthusiast with a passion for penetration testing and ethical hacking, committed to identifying and mitigating vulnerabilities in web applications, networks, and systems. Leveraging tools like Nmap, Burp Suite, WPScan, and Metasploit, I deliver actionable insights to enhance security postures.
I actively participate in Capture The Flag (CTF) challenges on platforms like Hack The Box and TryHackMe, simulating real-world attack scenarios to stay sharp. Beyond technical work, I enjoy networking with like-minded individuals to share findings and stay up to date with the latest techniques. I regularly attend cybersecurity meetups, including HackOut.ro, DefCon Cluj, Security Patch, and other community-driven events.
With a solid foundation in Python scripting and network analysis, I aspire to contribute as a full-time Penetration Tester, defending organizations against emerging cyber threats.
Programming Languages: Python | Bash | C++ | JavaScript
- Web Development: Proficient in building web scrapers and conducting manual and automated testing to ensure accurate data collection.
- Networking: Experienced in configuring Cisco servers, switches, and routers to ensure seamless connectivity and optimal network performance.
- Virtualization: Skilled in using VMware and Oracle VirtualBox to create and manage virtual machines for testing and development purposes.
While at Foony Limited, I actively contributed to web development projects, delivering effective solutions while staying updated on the latest industry trends and technologies. This dual focus allowed me to support the company's technological growth.
- Developed 20+ web scrapers using Python, Beautiful Soup, and Requests libraries.
- Designed a sophisticated web scraper tailored for eJobs, optimizing data retrieval processes. CanBeViewedHere
During my tenure at MApN, I played a crucial role in enhancing user productivity by installing and configuring IoT devices. Additionally, I set up servers with file transfer, email, and managed AD, applying policies and logs management to ensure system security. My participation in internal cybersecurity competitions demonstrated my expertise in identifying vulnerabilities and securing systems.
Feel free to connect with me to discuss opportunities for collaboration or to learn more about my experiences and skills!
Happy coding! π