+ ~ > whoami
+ I’m a Ukrainian student and a unix/linux & open-source enthusiast, trying to get into cybersecurity, gain some practical skills.
+
+ My interests are:
+
+ - Cybersecurity
+ - Low-level programming: C, Rust, Zig, C++, Assembly
+ - Reverse engineering (IDA, Ghidra, NinjaBinary)
+ - Electrical engineering
+ - PCB designing (KiCad — yet to try)
+ - Self-hosting
+ - A little bit of 3D
+ - A little bit of game development
+
+
+
+
+ Self-hosting
+ I have a Raspberry Pi 5 with 4GB of RAM running DietPi and nixpkgs (I hate outdated Debian packages).
+ Currently hosting a bunch of stuff on it via Docker containers with help of desec.io.
+
+
+
+
+ Some project I have
+
+ Since our college switched from Windows to Ubuntu, I had a cool idea to remotely control my classroom PCs.
+ I discovered gsocket.io
and started developing a tool that deploys a local web admin panel to collect logs from connected clients.
+ I used an Ubuntu VM in QEMU and Bash scripted everything with some help of AI.
+
+
+
+ Cybersecurity
+ I’ve been into cybersecurity for about 2 years now. I started with the normie setup — Kali Linux dual-booted next to Windows, learning through trial and error.
+ Eventually I spent more time on Linux, moved to KDE, configured everything myself, riced my terminal. Later switched to Arch and Hyprland.
+ I still have lots to learn, and I’d love to document all the tools and techniques I come across.
+
+ HackTheBox
+ HTB gave me that initial hands-on boost I needed.As of right now I’ve solved more than 50 boxes (3 of them “Insane”: DarkCorp, Mist, and MassGarden).
+ Even though I sometimes rely on writeups and walkthroughs, I learn a lot from the infrastructure behind each box.
+ I’m not sure if using writeups spoils the learning, but for now it gives me clarity and saves time. I aim to shift toward solving without spoilers in the future.
+
+ Russian targets
+ I’m Ukrainian, so I practice skills on real russian infrastructure. It’s morally right and beneficial, especially in these times.
+
+
+
+ Bug bounty
+ Bug bounty is fascinating — legally hacking in-scope apps and possibly earning money.
+ But as a beginner, it’s tough. Recon is time-consuming, and rewards don’t always justify the effort unless you're really skilled.
+ I’ve tried a few programs but haven't found any serious vulnerabilities yet. I plan to shift my focus toward learning specific attack techniques and improving my skills first.
+
+
+
+ My setup
+ I use Arch Linux on a laptop — it just works and lets me get things done. I run Hyprland and use NVChad for Neovim.
+
+ Here’s my fastfetch
output:
+ ~/shit ❯ fastfetch
+
+ OS : Arch Linux x86_64
+ Kernel : Linux 6.15.5-arch1-1
+ Packages : 2025 (pacman), 10 (flatpak-system), 1 (flatpak-user)
+ Display : 1920x1080 @ 144 Hz in 15" [Built-in]
+ WM : Hyprland 0.49.0 (Wayland)
+ Terminal : tmux 3.5a
+
+ CPU : 12th Gen Intel(R) Core(TM) i7-12650H
+ GPU : GeForce RTX 4060 Max-Q / Mobile
+ GPU : UHD Graphics
+ GPU Driver : nvidia (proprietary) 575.64.03
+ GPU Driver : i915
+ Memory : 9.28 GiB / 15.32 GiB (61%)
+ OS Age : 182 days
+ Uptime : 9 hours, 40 mins
+
+
+ My dotfiles are here: dotfiles
+
+