Skip to content
View secwexen's full-sized avatar
🛡️
Offensive & defensive cybersecurity expert — research, R&D, automation, exploit.
🛡️
Offensive & defensive cybersecurity expert — research, R&D, automation, exploit.

Block or report secwexen

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
secwexen/README.md

Cybersecurity & Ethical Hacking Expert

About Me

I am a cybersecurity expert specializing in ethical hacking, digital defense, and vulnerability assessment.
My primary focus is on proactively identifying and mitigating risks before they can be exploited by malicious actors.
I am strongly committed to safeguarding digital assets and anticipating adversarial tactics to remain one step ahead.

In addition to my cybersecurity expertise, I have a solid background in software development.
I design and implement Python-based tools for automation, threat intelligence, and SIEM optimization.
By integrating security and software engineering, I deliver efficient, resilient, and intelligent defense solutions.

I've been pursuing this journey with passion since 2022.


Quick Signal

  • Hands-on DFIR, Malware Analysis & Red Team labs
  • Security tooling development with Rust & Python
  • Threat Hunting, SIEM & Detection Engineering
  • Focus: adversarial simulation and detection bypass leading to improvement

Primary Focus

Detection Engineering & Threat Hunting with strong Red Team background.

All offensive research is used to improve detection, response, and resilience.

I focus on understanding the full attack lifecycle — from adversary tradecraft to detection and response — and on building tools and workflows that improve real-world defensive capabilities.


How I Think

  • I break systems to understand how to defend them
  • I enjoy turning attacker techniques into detection logic
  • Every exploit is a detection opportunity

Why Cybersecurity?

Cybersecurity is essential for the stability of modern digital systems.
Understanding how systems work, where they fail, and how to strengthen them is key to building secure and resilient infrastructures.
My focus is to achieve this through engineering, analysis, and continuous research.


Focus Areas & Current Learning Path

I am actively developing expertise across key cybersecurity domains, emphasizing hands-on experience and continuous learning.

  • Penetration Testing (Web, Network, Wireless)
  • Vulnerability Assessment & Exploit Development
  • Malware Analysis & Reverse Engineering
  • Incident Response & Digital Forensics
  • Threat Hunting & OSINT Investigation
  • Detection Engineering (Sigma, SPL, KQL)
  • MITRE ATT&CK mapping & adversary emulation
  • Detection Evasion Analysis for Rule Improvement

Skills Matrix

Category Tools / Technologies
Offensive Security Metasploit, Burp Suite, Nmap, SQLMap, Hydra, Gobuster
Defensive Security & Monitoring Splunk, ELK Stack, Suricata, Zeek, Wazuh, Wireshark
Digital Forensics (DFIR) Autopsy, Volatility, FTK Imager, Binwalk, Ghidra, IDA Free
Programming & Scripting Rust, Python, Bash, PowerShell
Cloud & Infrastructure Docker, Kubernetes, AWS, Azure, GCP
Operating Systems Kali Linux, Parrot OS, Arch Linux, Ubuntu, WSL, Windows Server

Hardware & Security Toolset

Specialized hardware used strictly in controlled lab environments for ethical research.

  • Flipper Zero
  • HackRF One
  • Proxmark3 RDV4
  • WiFi Pineapple
  • Raspberry Pi

Collaboration

  • Designing and hosting CTF challenges (Jeopardy & Attack-Defense style)
  • Real-world penetration testing scenarios (Web, Network, Wireless)
  • Malware analysis, unpacking, and reverse engineering
  • Secure coding and auditing in Rust, Python, and Bash
  • Contributing to open-source cybersecurity tools and red team utilities

Certification Goals & Academic Focus

Planned certifications and academic milestones include:

  • Offensive Security Certified Professional (OSCP) – Advanced penetration testing and exploit development
  • GIAC Security Essentials (GSEC) – Foundational security concepts and enterprise defense
  • CISSP – Certified Information Systems Security Professional - Enterprise security expertise
  • CompTIA Security+ - Foundational cybersecurity knowledge with global recognition

Languages

  • English
  • German — A1 (Beginner)

Selected Projects

AAPP‑MART — Autonomous Attack Path Prediction & Multi‑Agent Red Team Engine

AI‑driven framework for predicting attack paths and simulating them with autonomous red‑team agents.
Designed for continuous security testing and adversarial analysis.

Focus: Adversary emulation, detection validation, attack path analysis
Tech: Python, MITRE ATT&CK framework
GitHub Repository: secwexen/aappmart


Hands-on Labs & Proof of Work

Area Repository What it Shows
Adversary Simulation enterprise-attack-simulator Simulation framework leveraging MITRE ATT&CK techniques
Anomaly Detection log-anomaly-detector Machine learning-based log anomaly detection for SOC & threat hunting
DFIR Utility security-incident-artifact-analyzer DFIR triage tool for common artifacts (Sysmon, registry, browser history)
Toolset secwexen-arsenal Collection of offensive/defensive automation tools (Python, Rust, Bash, PowerShell)

Achievements & Contributions

  • Conducted research in network security and developed new vulnerability scenarios.
  • Developed new Rust modules for the open-source security tool “AAPP-MART”.
  • Published technical research notes on malware reverse engineering and network protocol analysis.
  • Performed vulnerability assessments and created Proof of Concept (PoC) exploits in controlled lab environments.
  • Designed and hosted CTF challenges adopted by local cybersecurity communities.

Blog, Notes, and Research Wiki

Professional blog entries focused on hardware security, wireless protocol analysis, and offensive security tooling.


Contact & Professional Links


Code of Ethics

  • All research, simulations, and tools are conducted in controlled environments for learning and defensive purposes.
  • Responsible disclosure is strictly followed for any vulnerabilities discovered.
  • Tools are not intended for illegal use; misuse is strictly prohibited.
  • The goal is always to enhance detection, improve defenses, and advance security research.

If you find my projects useful, don't forget to give them a star!
🔔 Also, consider following me to stay updated on my latest cybersecurity tools and write-ups.
🤝 For collaboration or inquiries, please reach out via my portfolio or GitHub.

Thanks for visiting my profile!


Current Work & Execution Focus

  • Developing Rust-based security tools for automation
  • Studying advanced malware analysis and reverse engineering
  • Preparing for OSCP certification
  • Building new CTF challenges for Red Team simulations
  • I am experimenting with threat-hunting automation and SIEM data analysis

“Cybersecurity is the discipline that transforms uncertainty into trust, and vigilance into resilience.”
secwexen


© 2026 secwexen. All Rights Reserved.

@secwexen's activity is private