MY PORTFOLIO 
& Projects:

Each project in this section tells a part of my story: my curiosity, my eagerness to learn, and my passion for what I do

Explore my projects

My Projects focus on...

Cyber Security

Development

Linux

Cloud

Server

& Many More...

VoiceOvers Portfolio

Discover the voiceovers of my portfolio articles.

My Portfolio & Projects:

Exploring Proxmox

In the vast panorama of virtual server management, my journey has led me to discover and appreciate the potential of Proxmox. In this …

Read more

Rasperry PI Pico, a powerful password stealer

IntroductionIn my experience as a Computer Security student, I have had the opportunity to delve into hacking techniques, including the theft of …

Read more

Kali Linux & WiFi Cracking

IntroductionThe world of wireless networking is a fascinating and ever-evolving area, full of challenges and opportunities. Over time, I have …

Read more

Kali Linux & Mail Server, for creating phishing emails via spoofing

Phishing is a social engineering technique used to obtain sensitive information from a user, such as login credentials, data …

Read more

Kali Linux and BEEF-XSS: How Easy Is Phishing and Social Engineering?

IntroductionCybersecurity is more than just a technical discipline; it is a passion. The desire to understand and challenge networks and…

Read more

Love Calculator: A Fun Compatibility Testing Website

Introduction Love is a fascinating mystery, and we often wonder if two people are truly compatible. In a digital world, exploring…

Read more

The ESP8266: Exploring the World of WiFi Networks and Cyber Security

IntroductionIn the world of technology, the ESP8266 is a name that has captured the attention of computer and security enthusiasts. It is …

Read more

Creation of the Cryptocurrency "PUL"

IntroductionThe world of cryptocurrency is constantly evolving, with new projects and ideas emerging all the time. In this article, …

Read more

Creating a VPN with WireGuard on Oracle Cloud:

IntroductionOnline security is a top priority, and one of the most effective solutions to protect your privacy and sensitive data is …

Read more