MY PORTFOLIO 
& Projects:

Each project in this section tells a part of my story: my curiosity, my eagerness to learn, and my passion for what I do

Explore my projects

My Projects focus on...

Cyber Security

Development

Linux

Cloud

Server

& Many More...

VoiceOvers Portfolio

Discover the voiceovers of my portfolio articles.

My Portfolio & Projects:

WPScan: WordPress Security with Kali Linux

WordPress is one of the most popular content management platforms in the world, but its popularity also makes it an attractive target for …

Read more

Deploy LinkStack on Portainer[Docker]

In today's digital landscape, sharing links to your websites, social media profiles, and online resources has become common practice. …

Read more

LinkStack: The Open-Source Alternative to LinkTree for Managing Your Websites

Managing links to your websites and social profiles has become an essential aspect for many people and businesses. LinkTree has become a …

Read more

Nmap: Network exploration and auditing

In the increasingly connected world of technology, network and system security is of paramount importance. To ensure the protection of…

Read more

Developing a WebView App with Firebase Notifications Integration

In the ever-evolving world of mobile applications, creating innovative solutions is essential to attract and engage …

Read more

Airegeddon: Simplifying Understanding Wi-Fi Security Threats

In today's increasingly connected world, Wi-Fi security is essential to protect personal data and ensure reliable connections…

Read more

Evil Twin and Captive Portal: Threats Hidden in Wi-Fi Networks

In today's increasingly digital environment, Wi-Fi network security is essential to protect sensitive data and ensure reliable connections…

Read more

Kali: WiFi Cracking, AirMon-NG and Hashcat

In today’s increasingly connected world, Wi-Fi network security has become of paramount importance. The growing reliance on …

Read more

Hydra Overview: A System Security Testing Tool

Hydra is a penetration testing tool used to test the security of systems and networks. It is designed to conduct force attacks …

Read more