I am a cybersecurity expert specializing in ethical hacking, digital defense, and vulnerability assessment.
My primary focus is on proactively identifying and mitigating risks before they can be exploited by malicious actors.
I am strongly committed to safeguarding digital assets and anticipating adversarial tactics to remain one step ahead.
In addition to my cybersecurity expertise, I have a solid background in software development.
I design and implement Python-based tools for automation, threat intelligence, and SIEM optimization.
By integrating security and software engineering, I deliver efficient, resilient, and intelligent defense solutions.
I've been pursuing this journey with passion since 2022.
🔐 Cybersecurity Expert
🛠 Offensive & Defensive Security
🐍 Python • 🦀 Rust • 🐧 Linux
🎯 Pentesting • Malware Analysis • DFIR
My goal is to master every domain of cybersecurity — from threat intelligence to digital forensics, protocol analysis to security automation. I believe true expertise comes from understanding the full spectrum: attack, defense, detection, and response. I build tools, study behaviors, and explore systems to uncover how security truly works — end to end.
Cybersecurity is essential for the stability of modern digital systems.
Understanding how systems work, where they fail, and how to strengthen them is key to building secure and resilient infrastructures.
My focus is to achieve this through engineering, analysis, and continuous research.
I am actively developing expertise across key cybersecurity domains, emphasizing hands-on experience and continuous learning.
- Penetration Testing (Web, Network, Wireless)
- Vulnerability Assessment & Exploit Development
- Malware Analysis & Reverse Engineering
- Incident Response & Digital Forensics
- Threat Hunting & OSINT Investigation
- Secure Software Development (Rust, Python, Bash, C)
- Container & Cloud Security (Docker, Kubernetes, AWS, Azure, GCP)
- Red Team Simulation & Adversarial Behavior Analysis
- Firmware & Hardware Security Analysis (UEFI, JTAG, SPI)
- Security Research & Exploit Development for Emerging Technologies (IoT, ICS/SCADA)
| Category | Tools / Technologies |
|---|---|
| Offensive Security | Metasploit, Burp Suite, Nmap, SQLMap, Hydra, Gobuster |
| Defensive Security & Monitoring | Splunk, ELK Stack, Suricata, Zeek, Wazuh, Wireshark |
| Digital Forensics (DFIR) | Autopsy, Volatility, FTK Imager, Binwalk, Ghidra, IDA Free |
| Programming & Scripting | Rust, Python, Bash, C, PowerShell |
| Cloud & Infrastructure | Docker, Kubernetes, AWS, Azure, GCP |
| Operating Systems | Kali Linux, Parrot OS, Arch Linux, Ubuntu, WSL, Windows Server |
| OSINT | Maltego, theHarvester, SpiderFoot, Shodan, Recon-ng, FOCA, Google Dorks, OSINT Framework |
Specialized hardware used strictly in controlled lab environments for ethical research.
- Flipper Zero
- HackRF One
- Proxmark3 RDV4
- WiFi Pineapple
- Raspberry Pi
- Designing and hosting CTF challenges (Jeopardy & Attack-Defense style)
- Real-world penetration testing scenarios (Web, Network, Wireless)
- Malware analysis, unpacking, and reverse engineering
- Secure coding and auditing in Rust, Python, and Bash
- Contributing to open-source cybersecurity tools and red team utilities
Planned certifications and academic milestones include:
- Offensive Security Certified Professional (OSCP) – Advanced penetration testing and exploit development
- Certified Ethical Hacker (CEH) – Ethical hacking methodologies and threat analysis
- GIAC Security Essentials (GSEC) – Foundational security concepts and enterprise defense
- CISSP – Certified Information Systems Security Professional
- CompTIA Security+ - Foundational cybersecurity knowledge with global recognition
- English
- German — A1 (Beginner)
A modular cybersecurity framework designed for analysts, red teams, and DFIR specialists.
Provides system analysis, memory forensics, and controlled offensive operations.
Status: Active
Version: v1.0.0
- Conducted research in network security and developed new vulnerability scenarios.
- Developed new Rust modules for the open-source security tool “Obscuron.”
- Published technical research notes on malware reverse engineering and network protocol analysis.
- Performed vulnerability assessments and created Proof of Concept (PoC) exploits in controlled lab environments.
- Designed and hosted CTF challenges adopted by local cybersecurity communities.
Professional blog entries focused on hardware security, wireless protocol analysis, and offensive security tooling.
- Website: https://secwexen.github.io/
- Email: Coming soon
- Portfolio: https://secwexen.github.io/
- CTF Writeups & Labs: https://github.com/secwexen/secwexen/tree/main/portfolio
- Research Notes: https://github.com/secwexen/secwexen/tree/main/reflections
- GitHub: https://github.com/secwexen
- Gist: https://gist.github.com/secwexen
- PGP Public Key: Coming soon — for secure communication and verification
- All research and experiments are conducted in controlled environments.
- I strictly follow responsible disclosure principles.
- I do not engage in or endorse illegal activity of any kind.
- The goal is always learning, defense, and responsible innovation.
⭐ If you find my projects useful, don't forget to give them a star!
🔔 Also, consider following me to stay updated on my latest cybersecurity tools and write-ups.
🤝 For collaboration or inquiries, please reach out via my portfolio or GitHub.
Thanks for visiting my profile!
- Developing Rust-based security tools for automation
- Studying advanced malware analysis and reverse engineering
- Preparing for OSCP certification
- Building new CTF challenges for Red Team simulations
- I am experimenting with threat-hunting automation and SIEM data analysis.
“Cybersecurity is the discipline that transforms uncertainty into trust, and vigilance into resilience.”
— secwexen
© 2026 secwexen — All Rights Reserved.
Disclaimer: All tools and research in this project have been developed solely for educational and ethical purposes, and any misuse is strictly prohibited.