- Focused on Red Team tactics and offensive security workflows;
- Exploring bug bounty methodologies and practical web exploitation;
- Open to discussions around security automation, OSINT, and tooling;
- Primary environment: Arch Linux (for better or worse);
- Contact: hi@x0r.xyz;
const rad1ant = {
code: {
languages: ["Python", "JavaScript", "Shell Scripting", "PHP"],
frameworks: ["React.js", "Node.js", "Express.js"],
},
tools: {
security: ["Burp Suite", "Wireshark", "John the Ripper", "Nmap", "Metasploit"],
virtualization: ["Docker", "KVM", "VMware"],
cloud: ["AWS", "Azure", "Heroku"],
others: ["Git", "rclone"],
},
architecture: {
styles: ["microservices", "event-driven", "design system pattern"],
security: ["secure web applications", "multi-factor authentication", "encryption"],
},
cybersecuritySkills: {
areas: ["Pentesting", "Security Audits", "Networking", "API Vulnerability Discovery", "Cybersecurity Awareness"],
methods: ["Vulnerability Assessment", "Threat Modeling", "Incident Response"],
},
}π± My Wakatime Data
TypeScript 1 hr 28 mins βββββββββββββββββββββββββ 42.91 %
HTML 1 hr 22 mins βββββββββββββββββββββββββ 39.98 %
TOML 13 mins βββββββββββββββββββββββββ 06.42 %
Text 9 mins βββββββββββββββββββββββββ 04.84 %
JSON 7 mins βββββββββββββββββββββββββ 03.45 %



