Location: Sydney, AUHTB Rank: Top 10%Targets Owned: 66Status: Learning
whoami
[jimit@cybersec ~]$ whoami
Cybersecurity student at University of Technology Sydney, pursuing Master of Information Technology (Extension).
Former Full Stack Developer transitioning into offensive security and penetration testing.
With a foundation in software development from my time at Quicko and Printerverse, I bring a developer's mindset
to security. I understand how applications are built, which helps me break them effectively. Currently deep-diving
into web application security, network penetration testing, and threat hunting.
Active on Hack The Box with 66 compromised targets and ranking in the Top 10%.
Constantly learning through hands-on labs, completing security modules across offensive and defensive domains.
[!] Focus Areas: Web Application Security | AI Red Teaming | Digital Forensics | Network Penetration Testing | Malware Analysis | Threat Intelligence
skills --list-all
Web Application Security
SQL Injection & SQLMap
Cross-Site Scripting (XSS)
Authentication Attacks
Command Injection
File Upload Vulnerabilities
Session Hijacking & CSRF
Web Proxies (Burp Suite, OWASP ZAP)
Directory Fuzzing with Ffuf
Network & Infrastructure
Network Enumeration (Nmap)
Network Traffic Analysis
Active Directory Fundamentals
Penetration Testing Process
Footprinting & Reconnaissance
Vulnerability Assessment
Offensive Security
Linux & Windows Exploitation
Shells & Payloads
Login Brute Forcing
File Transfer Techniques
Server-Side Attacks (SSRF, SSTI)
JavaScript Deobfuscation
Defensive Security & SOC
SIEM & Elastic Stack
Threat Hunting
Incident Response
Malware Analysis (Static & Dynamic)
Digital Forensics
IDS/IPS (Suricata, Snort, Zeek)
YARA & Sigma Rules
Windows Event Log Analysis
AI Security & Research
Red Teaming AI Systems
Prompt Injection Attacks
LLM Output Vulnerabilities
AI Data Poisoning
Machine Learning for InfoSec
Tools & Platforms
Kali Linux
Metasploit Framework
Wireshark & tcpdump
Python for Security Automation
FTK Imager, KAPE, Volatility
x64dbg (Debugging & Reversing)
htb_academy_progress.txt
66
Targets Compromised
Top 10%
Global Ranking
47+
Modules Enrolled
15
Completed Modules
✓ Completed Modules (100%)
Intro to Network Traffic Analysis
Medium | General
Intermediate Network Traffic Analysis
Easy | Defensive
Security Monitoring & SIEM Fundamentals
Easy | Defensive
Incident Handling Process
Easy | General
Security Incident Reporting
Easy | General
Web Requests
Fundamental | General
Introduction to Web Applications
Fundamental | General
Fundamentals of AI
Medium | General
Introduction to Information Security
Fundamental | General
⚡ In Progress (High Priority)
Introduction to Networking
Fundamental | General
95% Complete
Penetration Testing Process
Fundamental | General
93% Complete
Using Web Proxies
Easy | Offensive
73% Complete
Introduction to Red Teaming AI
Medium | Offensive
73% Complete
SQL Injection Fundamentals
Medium | Offensive
71% Complete
Vulnerability Assessment
Easy | Offensive
71% Complete
Threat Hunting with Elastic
Medium | Defensive
67% Complete
Applications of AI in InfoSec
Medium | General
64% Complete
[+] Currently focused on offensive security modules while maintaining defensive skills
[+] Special interest in AI/ML security and emerging threat vectors
certifications
$ ls -la ~/certs/
✓ Hack The Box Academy Student
Active learner with 47+ enrolled modules | Top 10% ranking