- I’m a Ukrainian student and a unix/linux & open-source enthusiast, trying to get into cybersecurity, gain - some practical skills.
+
+ I’m a Ukrainian student and a unix/linux & open-source enthusiast
+Specialized in Cybersecurity, Penetration Testing, Red-Teaming, Bug-Bounty hunting
My skills are:
- Cybersecurity
- Penetration testing -
- Low-level programming: C, Rust, Assembly (RISC-V, x86-64), C++, Zig +
- Low-level programming: C/C++, Assembly (RISC-V, x86-64, ARM), +
- Malware analysis/development +
- Reverse engineering (IDA, Ghidra, Binary Ninja)
- Self-hosting -
- Malware developmnet -
- Reverse engineering (IDA, Ghidra, NinjaBinary) -
- A little bit of 3D -
- A little bit of game development +
- DevOps +
- A little bit of 3D (Blender) +
- A little bit of game development (Unity, UE5)
-
Some projects I have
-Facinus
-Since our college switched from Windows to Ubuntu, I had a cool idea to remotely control my classroom PCs. -
-I discovered gsocket.io and started developing a tool that deploys a local web admin panel to - collect logs from connected clients.
-I used an Ubuntu VM in QEMU and Bash scripted everything with some help of AI.
- -OS-in-1000-lines
-OS Repo -
My implementation of Operating System in 1000 lines by Shinya Yanagita.
-A small operating system written from scratch for RISC-V CPU architecture.
-This project will have basic context switching, paging, user mode, a command-line shell, a disk device driver, and file read/write operations in C.
-And also I'll try to add some more functionality to it.
-Right now I'm still working on basic stuff before implementing something new.
-I'm still learning C and Assembly, the RISC-V instruction set is new to me.
- --
Cybersecurity
I’ve been into cybersecurity for about 2 years now. I started with the normie setup — Kali Linux dual-booted next to Windows, learning through trial and error.
Eventually I spent more time on Linux, moved to KDE, configured everything myself, riced my terminal. Later switched to Arch and Hyprland.
-I still have lots to learn, and I’d love to document all the tools and techniques I come across.
+Have experience with web penetration testing as well as Red Teaming in general
+Know and use in practice many different tools/tecniques for tests, favorite ones:
+ +-
+
- Reconnaissance: ffuf, subfinder, httpx +
- Web pentest: Burp Suite (OWASP ZAP), dalfom, curl, intersect, manual scripting (with python) +
- Lateral movement: impacket (windows), linpeas.sh (linux), bloodhound, netcat, chisel and maany-many more. +
- Reverse engineering & Binary exploitation: mainly Ghidra, IDA Pro, strace, strings, gdb etc. +
- Persistence: gsocket, segfault (thc.org), process hiding etc. +
There's still big room to improve since there's insane amount of different fields to explore and that's what I'm trying to do.
HackTheBox
My HTB profile
-HTB gave me that initial hands-on boost I needed. As of right now I’ve solved more than 50 boxes (3 of them - “Insane”: DarkCorp, Mist, and MassGarden).
+HTB gave me that initial hands-on boost I needed. As of right now I’ve solved more than 50 boxes (4 of them + “Insane”: DarkCorp, Mist, MassGarden and Cobblestone).
+I like to solve different challeneges there, especially reverse engineering, web and pwn.
Even though I sometimes rely on writeups and walkthroughs, I learn a lot from the infrastructure behind each box.
+
Some projects I have
+ +Facinus
+ + Repo +Since our college switched from Windows to Ubuntu, I had a cool idea to remotely control my classroom PCs. +
+I discovered gsocket.io and started developing a tool that deploys a local web admin panel to + collect logs from connected clients.
+I used an Ubuntu VM in QEMU and Bash scripted everything with some help of AI.
+ +OS-in-1000-lines
+Repo +
My implementation of Operating System in 1000 lines by Shinya Yanagita.
+A small operating system written from scratch for RISC-V CPU architecture.
+This project will have basic context switching, paging, user mode, a command-line shell, a disk device driver, and file read/write operations in C.
+And also I'll try to add some more functionality to it.
+Right now I'm still working on basic stuff before implementing something new.
+I'm still learning C and Assembly, the RISC-V instruction set is new to me.
+ +Reverse engineering book translation
+Repo +
This is a book from @mytechnotalent (English version here) that I decided would be cool to translate in Ukrainian with automated python script and LLM hosted locally
+I generally moved from outdated gitbook to honkit for publishing this as an E-book, created a python script for + parsing markdown files and translating using LTEngine and Llama LLM (8b params) hosted locally.
+I was also able to make an automatic push to my github pages on each update
+ ++
Bug bounty
Bug bounty is fascinating — legally hacking in-scope apps and possibly earning money.
But as a beginner, it’s tough. Recon is time-consuming, and rewards don’t always justify the effort unless you're really skilled.
-I’ve tried a few programs but haven't found any serious vulnerabilities yet. I plan to shift my focus - toward learning specific attack techniques and improving my skills first.
+But there is a big amount of knowledge I'm gainining, when exploring all the different aprroaches these companies use to secure themselves. + It doesn't always bring financial benefits, but it always provides practical experience working with real targets.
+I like to compare bug-bounty to a chess game: you have several 'openings' but with each step you open more available steps to play around.
+