I break systems to understand them — focused on penetration testing, exploit development, and red team operations. The best defense starts with thinking like an attacker.
I'm a self-driven developer transitioning into offensive security — focused on penetration testing, vulnerability research, and exploit development. I study how systems are broken, from web app exploitation to network attacks, because understanding the attack surface is the only way to truly secure it.
I think like an attacker — not just to build, but to break. I train in CTF challenges on HackTheBox and TryHackMe, learn exploitation techniques hands-on, and study real-world CVEs and attack chains. Being a developer helps me understand what makes software vulnerable from the inside out.
NmapReconAutomation tool for creating GitHub repositories and pushing local projects, leveraging local LLM via Ollama to generate intelligent project names and descriptions.

A blockchain simulation demonstrating core concepts: blocks, mining, transactions, and peer-to-peer networking with a focus on cryptographic integrity.
Real-time hand gesture detection via webcam using cvzone and OpenCV — an exploration of computer vision pipelines.

Implements a Q-Learning algorithm to solve the FrozenLake environment from Gymnasium on 4x4 and 8x8 grids.
Working on something offensive security-related. Stay tuned!

Independent Learning
Actively training on HackTheBox and TryHackMe — working through machines covering web exploitation (SQLi, XSS, SSRF, RCE), privilege escalation, network enumeration, and post-exploitation.
District Level Competition
Achieved 1st place in Lomba Kompetensi Siswa (LKS) for IT Software Solutions for Business at district level, demonstrating strong analytical thinking and practical problem solving under pressure.
Student — Software Engineering
Structured learning in programming, backend development, and software engineering principles. The developer background gives a unique advantage in offensive security.
Foundation Building
Started learning programming and web development independently. Knowing how applications are built is the first step to knowing how to attack them.
Have a project in mind or just want to say hi? Feel free to reach out!