HACK
THE PLANET.
Software Engineer with production DevOps experience, now learning to break into systems to understand how to defend them.
Software Engineer transitioning into cybersecurity — learning to defend and test the systems I build.
I'm a Software & DevOps Engineer based in Islamabad, Pakistan, currently diving deep into the world of cybersecurity. With a strong foundation in building production-grade backend systems using Django, FastAPI, and cloud infrastructure, I'm now applying that knowledge to understand how systems can be secured and tested.
Currently learning network security fundamentals, penetration testing methodologies, and hands-on tools like NMAP, Wireshark, Burp Suite, and Metasploit. My background in DevOps (Docker, CI/CD, Linux) gives me a unique perspective on infrastructure security and hardening.
I don't have professional cybersecurity experience yet — I'm in the learning phase. But I believe my engineering background and hands-on mindset will help me grow fast in this field. Currently completing my Bachelor's in Software Engineering at the University of Haripur.
TOOLS
& ARSENAL.
Security tools and technologies I'm learning to master for penetration testing, network analysis, and vulnerability assessment.
OPERATION
FLOW.
A brutal, repeatable workflow. The goal is clarity, not chaos.
RECON
Collect intel, map surface area, validate targets.
ENUM
Identify services, versions, and weak edges.
EXPLOIT
Test hypotheses. Prove impact. Stay controlled.
HARDEN
Turn findings into concrete defenses and fixes.
REPORT
Clear narrative: steps, evidence, remediation.
LEARNING
PATH.
My structured approach to cybersecurity education. Currently focused on building a strong foundation before specializing.
Network Security Fundamentals
Understanding TCP/IP stack, OSI model, subnetting, firewalls, IDS/IPS, VPNs, and secure network architecture design principles.
Penetration Testing & Ethical Hacking
Learning the penetration testing lifecycle — reconnaissance, scanning, exploitation, post-exploitation, and reporting using industry-standard tools.
Web Application Security
Studying OWASP Top 10 vulnerabilities, XSS, SQL injection, CSRF, authentication flaws, and secure coding practices.
System & Infrastructure Hardening
Applying my DevOps background to learn Linux hardening, Docker security, CI/CD pipeline security, and cloud security best practices.
Digital Forensics & Incident Response
Planning to learn disk forensics, memory analysis, log investigation, malware analysis basics, and incident response procedures.
FIELD
LABS.
Hands-on practice, not vibes. I train with CTFs and lab environments to build repeatable recon, enumeration, and reporting habits.
TryHackMe — Pre Security
ACTIVENetworking + Linux fundamentals
Hack The Box — Starting Point
ACTIVEEnumeration + exploitation basics
PortSwigger — Web Security Academy
IN PROGRESSOWASP Top 10 + Burp Suite workflow
Blue Team — Log Hunting Drills
PLANNEDDetection mindset + incident response
OPSEC
NOTES.
Short writeups, templates, and repeatable checks. Built like a runbook.
Recon Notes: Subdomains (passive → active)
Fast target mapping: collect → validate → fingerprint → document.
Burp Workflow: Auth bypass checks
Session handling + role checks + endpoint discovery in a repeatable order.
NMAP Baseline: enumeration templates
Clean scan presets for services, scripts, and output structure.
SKILL
RADAR.
Real-time capability assessment across cybersecurity domains. Active learning = active growth.
PORT_SCAN detected on 10.0.0.5:445
SSH brute-force attempt from 192.168.1.42
DNS exfiltration pattern matched
Reverse shell callback on port 4444
NMAP SYN scan completed — 23 hosts up
Gobuster found /admin on target.local
OPS
METRICS.
Numbers don't lie. Tracking progress across every domain — hours invested, challenges solved, tools mastered.
THREAT
MAP.
Visualizing global attack surfaces. Understanding where threats originate is the first step in building defenses.
BREACH
PROTOCOL
Every system has a vulnerability. The question is whether you find it first — or someone else does.
KILL
CHAIN.
Visualizing the attack path from initial access to crown jewels. Every node is a decision point.
RECON: Scan perimeter, identify open ports
BYPASS: Evade firewall via misconfigured router
EXPLOIT: RCE on application server (CVE-2024-XXXX)
PIVOT: Lateral movement to crown jewel
PENTEST
SIM.
Watch a simulated penetration test in real-time. Recon → enum → exploit → access. This is how it flows.
# Objective: Enumerate, exploit, document
# Rules of Engagement: Stay in scope
CERT
TARGETS.
Certifications I'm targeting to validate my cybersecurity knowledge and skills.
CompTIA Security+
Foundation-level cybersecurity certification covering network security, compliance, threats, and vulnerabilities.
CEH — Certified Ethical Hacker
EC-Council certification for penetration testing methodologies, tools, and ethical hacking techniques.
CompTIA Network+
Networking fundamentals certification — infrastructure, troubleshooting, and network operations.
OSCP — Offensive Security Certified Professional
Advanced hands-on penetration testing certification. The gold standard for offensive security professionals.
TryHackMe / HackTheBox
Practicing on CTF platforms and virtual labs to build practical hacking and defense skills.
eJPT — eLearnSecurity Junior Penetration Tester
Entry-level penetration testing certification with practical exam — great starting point.
BACK
GROUND.
My software engineering and DevOps experience — the foundation that powers my cybersecurity journey.
AMAL AXIS
Junior Software & DevOps Engineer
Building and deploying production backend systems, managing CI/CD pipelines, server infrastructure, and cloud deployments. This DevOps experience directly supports my cybersecurity learning.
UPWORK
Python Engineer — Top Rated
Top-rated freelance professional delivering Django, FastAPI, and infrastructure projects. Understanding real-world systems helps identify security vulnerabilities.
FIVERR
Python Engineer
Trusted Fiverr freelancer with 5-star deliveries. Backend development and system administration experience forming the foundation for security work.
Bachelor's in Software Engineering
University of Haripur
F.Sc. Computer Science
BASE Group of Colleges
LET'S
CONNECT.
Interested in cybersecurity collaboration, learning together, or need a software engineer? Let's talk.
