I am a cybersecurity expert specializing in ethical hacking, digital defense, and vulnerability assessment.
My primary focus is on proactively identifying and mitigating risks before they can be exploited by malicious actors.
I am strongly committed to safeguarding digital assets and anticipating adversarial tactics to remain one step ahead.
In addition to my cybersecurity expertise, I have a solid background in software development.
I design and implement Python-based tools for automation, threat intelligence, and SIEM optimization.
By integrating security and software engineering, I deliver efficient, resilient, and intelligent defense solutions.
I've been pursuing this journey with passion since 2022.
- Hands-on DFIR, Malware Analysis & Red Team labs
- Security tooling development with Rust & Python
- Threat Hunting, SIEM & Detection Engineering
- Focus: adversarial simulation and detection bypass leading to improvement
Detection Engineering & Threat Hunting with strong Red Team background.
All offensive research is used to improve detection, response, and resilience.
I focus on understanding the full attack lifecycle — from adversary tradecraft to detection and response — and on building tools and workflows that improve real-world defensive capabilities.
- I break systems to understand how to defend them
- I enjoy turning attacker techniques into detection logic
- Every exploit is a detection opportunity
Cybersecurity is essential for the stability of modern digital systems.
Understanding how systems work, where they fail, and how to strengthen them is key to building secure and resilient infrastructures.
My focus is to achieve this through engineering, analysis, and continuous research.
I am actively developing expertise across key cybersecurity domains, emphasizing hands-on experience and continuous learning.
- Penetration Testing (Web, Network, Wireless)
- Vulnerability Assessment & Exploit Development
- Malware Analysis & Reverse Engineering
- Incident Response & Digital Forensics
- Threat Hunting & OSINT Investigation
- Detection Engineering (Sigma, SPL, KQL)
- MITRE ATT&CK mapping & adversary emulation
- Detection Evasion Analysis for Rule Improvement
| Category | Tools / Technologies |
|---|---|
| Offensive Security | Metasploit, Burp Suite, Nmap, SQLMap, Hydra, Gobuster |
| Defensive Security & Monitoring | Splunk, ELK Stack, Suricata, Zeek, Wazuh, Wireshark |
| Digital Forensics (DFIR) | Autopsy, Volatility, FTK Imager, Binwalk, Ghidra, IDA Free |
| Programming & Scripting | Rust, Python, Bash, PowerShell |
| Cloud & Infrastructure | Docker, Kubernetes, AWS, Azure, GCP |
| Operating Systems | Kali Linux, Parrot OS, Arch Linux, Ubuntu, WSL, Windows Server |
Specialized hardware used strictly in controlled lab environments for ethical research.
- Flipper Zero
- HackRF One
- Proxmark3 RDV4
- WiFi Pineapple
- Raspberry Pi
- Designing and hosting CTF challenges (Jeopardy & Attack-Defense style)
- Real-world penetration testing scenarios (Web, Network, Wireless)
- Malware analysis, unpacking, and reverse engineering
- Secure coding and auditing in Rust, Python, and Bash
- Contributing to open-source cybersecurity tools and red team utilities
Planned certifications and academic milestones include:
- Offensive Security Certified Professional (OSCP) – Advanced penetration testing and exploit development
- GIAC Security Essentials (GSEC) – Foundational security concepts and enterprise defense
- CISSP – Certified Information Systems Security Professional - Enterprise security expertise
- CompTIA Security+ - Foundational cybersecurity knowledge with global recognition
- English
- German — A1 (Beginner)
AI‑driven framework for predicting attack paths and simulating them with autonomous red‑team agents.
Designed for continuous security testing and adversarial analysis.
Focus: Adversary emulation, detection validation, attack path analysis
Tech: Python, MITRE ATT&CK framework
GitHub Repository: secwexen/aappmart
| Area | Repository | What it Shows |
|---|---|---|
| Adversary Simulation | enterprise-attack-simulator | Simulation framework leveraging MITRE ATT&CK techniques |
| Anomaly Detection | log-anomaly-detector | Machine learning-based log anomaly detection for SOC & threat hunting |
| DFIR Utility | security-incident-artifact-analyzer | DFIR triage tool for common artifacts (Sysmon, registry, browser history) |
| Toolset | secwexen-arsenal | Collection of offensive/defensive automation tools (Python, Rust, Bash, PowerShell) |
- Conducted research in network security and developed new vulnerability scenarios.
- Developed new Rust modules for the open-source security tool “AAPP-MART”.
- Published technical research notes on malware reverse engineering and network protocol analysis.
- Performed vulnerability assessments and created Proof of Concept (PoC) exploits in controlled lab environments.
- Designed and hosted CTF challenges adopted by local cybersecurity communities.
Professional blog entries focused on hardware security, wireless protocol analysis, and offensive security tooling.
- Website: Landing / About
- Email: Coming soon
- Portfolio: CTF Writeups & Labs
- Blog: Blog Posts
- Reflections: Research Notes
- GitHub: GitHub Profile
- Gist: Gist Snippets
- PGP Public Key: Coming soon — for secure communication and verification
- All research, simulations, and tools are conducted in controlled environments for learning and defensive purposes.
- Responsible disclosure is strictly followed for any vulnerabilities discovered.
- Tools are not intended for illegal use; misuse is strictly prohibited.
- The goal is always to enhance detection, improve defenses, and advance security research.
⭐ If you find my projects useful, don't forget to give them a star!
🔔 Also, consider following me to stay updated on my latest cybersecurity tools and write-ups.
🤝 For collaboration or inquiries, please reach out via my portfolio or GitHub.
Thanks for visiting my profile!
- Developing Rust-based security tools for automation
- Studying advanced malware analysis and reverse engineering
- Preparing for OSCP certification
- Building new CTF challenges for Red Team simulations
- I am experimenting with threat-hunting automation and SIEM data analysis
“Cybersecurity is the discipline that transforms uncertainty into trust, and vigilance into resilience.”
— secwexen
© 2026 secwexen. All Rights Reserved.