\ \ / /__| | ___ ___ _ __ ___ ___
\ \ /\ / / _ \ |/ __/ _ \| '_ ` _ \ / _ \
\ V V / __/ | (_| (_) | | | | | | __/
\_/\_/ \___|_|\___\___/|_| |_| |_|\___|
[SYSTEM] Initializing security system...
[BOOT] Loading red team modules [OK]
[INIT] Mounting security tools [OK]
[LOAD] Starting penetration testing services [OK]
[EXEC] Loading portfolio.sh [OK]
[INIT] Initializing cybersecurity interface [OK]
[DONE] System ready for ethical hacking [READY]
Passionate about offensive security — learning & practicing ethically
Cybersecurity focus areas:
> Web Application Penetration Testing
> Red Team Methodologies
> Cryptography & Network Security
> CTF Challenges & Vulnerable Labs
$ cat contact.txt
GitHub: github.com/thehusnain · by Husnain
$ _|
Hi — I'm Husnain, a passionate cybersecurity enthusiast and BS Computer Science student from Haripur, Pakistan. I started my cybersecurity journey 4 months ago and have been dedicating my time to learning, practicing, and improving every single day.
Although I'm still in the learning phase, I'm proud to be ranked in the top 5% on TryHackMe. I actively participate in CTF challenges, build my own vulnerable labs for legal practice, and focus mainly on web application penetration testing and cryptography fundamentals.
I use Kali Linux as my primary OS for security testing and exploration, and I strongly believe in ethical hacking, responsible learning, and continuous growth. My tech stack includes Burp Suite, Wireshark, GitHub, Metasploit, Gobuster, and various cryptography tools.
const securityEnthusiast = {
name: "Husnain",
role: "Cybersecurity Learner & Aspiring Red Teamer",
location: "Haripur, Pakistan",
education: "BS Computer Science",
experience: "4 months in cybersecurity",
achievements: [
"Top 5% on TryHackMe",
"Cisco Cybersecurity Certificate",
"Active CTF Participant"
],
skills: [
"Web Penetration Testing",
"Cryptography",
"Network Security",
"Vulnerability Assessment",
"Kali Linux"
],
tools: [
"Burp Suite",
"Wireshark",
"Metasploit",
"Nmap",
"SQLMap",
"Gobuster"
],
funFact: "I build vulnerable labs and solve CTFs to test new techniques ethically."
};
Username: thephantomdelux • Rank: Top 5%
Intensive self-study in cybersecurity through TryHackMe, CTF challenges, and vulnerable lab environments. Building practical skills in web penetration testing, network security, and cryptography.
Creating and maintaining personal vulnerable labs for legal practice and testing of security techniques. Implementing various vulnerabilities to understand exploitation and remediation methods.
Regular participation in Capture The Flag competitions to enhance practical skills. Solving challenges in web exploitation, cryptography, reverse engineering, and forensics.
Pursuing Bachelor's degree in Computer Science with focus on cybersecurity fundamentals, networking, operating systems, and secure software development principles.
Dedicated self-study through online platforms including TryHackMe, Cisco Networking Academy, and various cybersecurity resources. Focus on practical, hands-on learning.
Certified in threat intelligence methodologies, governance frameworks, and security analysis techniques. Completed all requirements and passed the comprehensive examination.
Completed comprehensive introduction to cybersecurity covering threats, vulnerabilities, cryptography basics, and network security fundamentals.
Achieved top 5% ranking among TryHackMe's global community through consistent learning and completion of security challenges.
Fundamental networking knowledge including TCP/IP, network protocols, routing, switching, and network architecture essentials.
A comprehensive web application security scanner that tests websites for vulnerabilities using Nmap, SQLMap, SSLScan, and Nikto. Features automated report generation with AI analysis.
Personal vulnerable lab environment for practicing penetration testing techniques legally. Includes intentionally vulnerable web applications and network services for skill development.
Collection of cryptography tools and scripts for encryption, decryption, and cryptographic analysis. Includes implementations of various ciphers and cryptographic protocols.
Reflections on my initial cybersecurity journey, from basic concepts to achieving top 5% on TryHackMe. Challenges faced and lessons learned...
Read More →Understanding common web vulnerabilities and how to ethically test for them. Covering SQL injection, XSS, CSRF, and security headers...
Read More →Step-by-step guide to creating your own vulnerable lab environment for legal security practice. Tools, configurations, and safety considerations...
Read More →