- 2018: Joined as a Cybersecurity Analyst at].
- 2015: Started contributing to Open Source Projects.
- 2013: Developed multiple Full Stack applications for clients.
- 2010: Obtained a certification in Network Administration.
| Skill | Description |
|---|---|
| Web Development | HTML, CSS, JavaScript, React, Node.js |
| Cybersecurity | Penetration Testing, Forensic Analysis, Threat Detection |
| Networking | Cisco, Juniper, VPN, Network Troubleshooting |
| Database | SQL, MongoDB, PostgreSQL |
- Certification in Network Administration 📃
- Certification in Cybersecurity 🔐
🛡️ Enterprise-grade bots engineered for speed, reliability, and stealth | Multi-platform appointment domination
╔══════════════════════════════════════════════════════════╗
║ 🌍 BLS INTERNATIONAL NETWORK ║
║ Automated Booking · Selfie Bypass · Queue Snipe ║
╚══════════════════════════════════════════════════════════╝
|
|
|
|
╔══════════════════════════════════════════════════════════╗
║ 🏛️ EMBASSY & CONSULATE AUTOMATION ║
║ Italy · Germany · Turkey — Direct Portal Access ║
╚══════════════════════════════════════════════════════════╝
|
|
╔══════════════════════════════════════════════════════════╗
║ 🌐 VFS GLOBAL & ALMAVIVA NETWORK ║
║ Turkey · Global Portal · Almaviva — Full Coverage ║
╚══════════════════════════════════════════════════════════╝
|
|
|
| # | Bot | Platform | Highlight | Link |
|---|---|---|---|---|
| 01 | BLS Morocco Bot | BLS International | Selfie Bypass | → View Repo |
| 02 | BLS Pakistan Bot | BLS International | Slot Sniper | → View Repo |
| 03 | BLS Algeria Bot | BLS International | Selfie Bypass | → View Repo |
| 04 | Mauritania Bot | BLS International | Auto-Booking | → View Repo |
| 05 | Prenotami Italy Bot | Italy Embassy | Portal Automation | → View Repo |
| 06 | Germany Appointment Bot | DE Consulate | Real-Time Sniping | → View Repo |
| 07 | VFS Turkey Bot | VFS Global | Session Management | → View Repo |
| 08 | VFS Global Bot | VFS Global | Multi-Region | → View Repo |
| 09 | Almaviva Bot | Almaviva | Italian Consulates | → View Repo |
Research focus spans enterprise environments, industrial control systems (ICS/OT), and critical national infrastructure — with emphasis on understanding attacker tradecraft to build resilient, evidence-based defenses.
Primary Research Areas
─────────────────────────────────────────────────────────────────────
▸ Adversarial Simulation & Purple Team Operations
▸ Critical Infrastructure Attack Surfaces (ICS / SCADA / OT)
▸ Vulnerability Research — Zero-Day Triage & Responsible Disclosure
▸ Malware Behavioral Analysis & Reverse Engineering
▸ Supply Chain Security & Third-Party Risk Modeling
Key Principles:
- Threat-informed defense over compliance-first security
- Evidence-based risk prioritization using adversary intelligence
- Continuous validation of defensive controls against real TTPs
Operationalizing Cyber Threat Intelligence (CTI) — from raw indicator ingestion to finished intelligence products that drive defensive action. Analysis grounded in the MITRE ATT&CK framework with structured diamond model methodology.
|
Intelligence Collection
|
Intelligence Application
|
Intelligence Frameworks & Standards
─────────────────────────────────────────────────────────────────────
MITRE ATT&CK │ D3FEND │ STIX/TAXII │ OpenCTI
Diamond Model │ Kill Chain │ TIBER-EU │ NIST CSF
Designing and building security systems that are resilient by architecture — not bolted on as afterthought. Focused on defense-in-depth models that survive adversarial pressure, not just audit scrutiny.
|
Identity & Access |
Network Security |
Cloud & Infra |
Building detection capabilities that scale — from SIEM rule engineering to full SOC buildout. Incident response grounded in structured methodology, forensic integrity, and post-incident intelligence extraction.
|
Detection Engineering
Tooling |
Incident Response
IR Lifecycle |
Embedding security into the software delivery lifecycle — not as a gate, but as a continuous, automated capability. Security that moves at the speed of engineering.
Secure SDLC Pipeline
─────────────────────────────────────────────────────────────────────────────
Code → Commit → Build → Test → Deploy
───────── ─────────── ────────── ────────── ───────
Threat Pre-commit SAST / SCA DAST / IAST Runtime
Modeling Hooks Container Fuzzing Protection
Secure Secret Image Scan Pentest CSPM
Coding Scanning Signing Compliance Monitoring
Standards SBOM Gen Gate Check Alerting
Continuous learning is non-negotiable in security. Frameworks, communities, and resources that inform daily practice:
|
Frameworks & Standards
|
Communities & Intelligence Feeds
|
Certifications & Training Pathways
╔════════════════════════════════════════════════════════════════════════╗
║ ║
║ "Security is not a product you buy. It's a posture you maintain." ║
║ ║
║ Know your adversary. Understand your terrain. Defend with intent. ║
║ ║
╚════════════════════════════════════════════════════════════════════════╝


