From 0b74aec7f20521e72957c5b0a4d9ba0a39ee4d62 Mon Sep 17 00:00:00 2001 From: Amoelle Date: Wed, 27 Aug 2025 22:13:14 +0300 Subject: [PATCH] update whoami --- posts/whoami.html | 91 ++++++++++++++++++++++++++++++----------------- 1 file changed, 58 insertions(+), 33 deletions(-) diff --git a/posts/whoami.html b/posts/whoami.html index 56a82ab..ab9c239 100644 --- a/posts/whoami.html +++ b/posts/whoami.html @@ -25,71 +25,96 @@
- elleoma -

I’m a Ukrainian student and a unix/linux & open-source enthusiast, trying to get into cybersecurity, gain - some practical skills.

+ elleoma +

I’m a Ukrainian student and a unix/linux & open-source enthusiast

+

Specialized in Cybersecurity, Penetration Testing, Red-Teaming, Bug-Bounty hunting

My skills are:

  • Cybersecurity
  • Penetration testing
  • -
  • Low-level programming: C, Rust, Assembly (RISC-V, x86-64), C++, Zig
  • +
  • Low-level programming: C/C++, Assembly (RISC-V, x86-64, ARM),
  • +
  • Malware analysis/development
  • +
  • Reverse engineering (IDA, Ghidra, Binary Ninja)
  • Self-hosting
  • -
  • Malware developmnet
  • -
  • Reverse engineering (IDA, Ghidra, NinjaBinary)
  • -
  • A little bit of 3D
  • -
  • A little bit of game development
  • +
  • DevOps
  • +
  • A little bit of 3D (Blender)
  • +
  • A little bit of game development (Unity, UE5)

-

Some projects I have

-

Facinus

-

Since our college switched from Windows to Ubuntu, I had a cool idea to remotely control my classroom PCs. -

-

I discovered gsocket.io and started developing a tool that deploys a local web admin panel to - collect logs from connected clients.

-

I used an Ubuntu VM in QEMU and Bash scripted everything with some help of AI.

- -

OS-in-1000-lines

-

OS Repo -

My implementation of Operating System in 1000 lines by Shinya Yanagita.

-

A small operating system written from scratch for RISC-V CPU architecture.

-

This project will have basic context switching, paging, user mode, a command-line shell, a disk device driver, and file read/write operations in C.

-

And also I'll try to add some more functionality to it.

-

Right now I'm still working on basic stuff before implementing something new.

-

I'm still learning C and Assembly, the RISC-V instruction set is new to me.

- -
-

Cybersecurity

I’ve been into cybersecurity for about 2 years now. I started with the normie setup — Kali Linux dual-booted next to Windows, learning through trial and error.

Eventually I spent more time on Linux, moved to KDE, configured everything myself, riced my terminal. Later switched to Arch and Hyprland.

-

I still have lots to learn, and I’d love to document all the tools and techniques I come across.

+

Have experience with web penetration testing as well as Red Teaming in general

+

Know and use in practice many different tools/tecniques for tests, favorite ones:

+ +
    +
  • Reconnaissance: ffuf, subfinder, httpx
  • +
  • Web pentest: Burp Suite (OWASP ZAP), dalfom, curl, intersect, manual scripting (with python)
  • +
  • Lateral movement: impacket (windows), linpeas.sh (linux), bloodhound, netcat, chisel and maany-many more.
  • +
  • Reverse engineering & Binary exploitation: mainly Ghidra, IDA Pro, strace, strings, gdb etc.
  • +
  • Persistence: gsocket, segfault (thc.org), process hiding etc.
  • +
+ +

There's still big room to improve since there's insane amount of different fields to explore and that's what I'm trying to do.

HackTheBox

My HTB profile

-

HTB gave me that initial hands-on boost I needed. As of right now I’ve solved more than 50 boxes (3 of them - “Insane”: DarkCorp, Mist, and MassGarden).

+

HTB gave me that initial hands-on boost I needed. As of right now I’ve solved more than 50 boxes (4 of them + “Insane”: DarkCorp, Mist, MassGarden and Cobblestone).

+

I like to solve different challeneges there, especially reverse engineering, web and pwn.

Even though I sometimes rely on writeups and walkthroughs, I learn a lot from the infrastructure behind each box.


+

Some projects I have

+ +

Facinus

+ + Repo +

Since our college switched from Windows to Ubuntu, I had a cool idea to remotely control my classroom PCs. +

+

I discovered gsocket.io and started developing a tool that deploys a local web admin panel to + collect logs from connected clients.

+

I used an Ubuntu VM in QEMU and Bash scripted everything with some help of AI.

+ +

OS-in-1000-lines

+

Repo +

My implementation of Operating System in 1000 lines by Shinya Yanagita.

+

A small operating system written from scratch for RISC-V CPU architecture.

+

This project will have basic context switching, paging, user mode, a command-line shell, a disk device driver, and file read/write operations in C.

+

And also I'll try to add some more functionality to it.

+

Right now I'm still working on basic stuff before implementing something new.

+

I'm still learning C and Assembly, the RISC-V instruction set is new to me.

+ +

Reverse engineering book translation

+

Repo +

Book translation +

This is a book from @mytechnotalent (English version here) that I decided would be cool to translate in Ukrainian with automated python script and LLM hosted locally

+

I generally moved from outdated gitbook to honkit for publishing this as an E-book, created a python script for + parsing markdown files and translating using LTEngine and Llama LLM (8b params) hosted locally.

+

I was also able to make an automatic push to my github pages on each update

+ +
+

Bug bounty

Bug bounty is fascinating — legally hacking in-scope apps and possibly earning money.

But as a beginner, it’s tough. Recon is time-consuming, and rewards don’t always justify the effort unless you're really skilled.

-

I’ve tried a few programs but haven't found any serious vulnerabilities yet. I plan to shift my focus - toward learning specific attack techniques and improving my skills first.

+

But there is a big amount of knowledge I'm gainining, when exploring all the different aprroaches these companies use to secure themselves. + It doesn't always bring financial benefits, but it always provides practical experience working with real targets.

+

I like to compare bug-bounty to a chess game: you have several 'openings' but with each step you open more available steps to play around.


- My self-hosting setup + My self-hosting setup

Self-hosting