About Me

I am a cybersecurity enthusiast with a strong passion for both offensive and defensive security. My focus lies in understanding how systems are attacked and how they can be protected against real-world threats. By combining Red Team and Blue Team methodologies, I aim to bridge the gap between breaking systems and securing them.

On the offensive side, I work on penetration testing, vulnerability discovery, and attack simulation to identify weaknesses in networks, applications, and systems. On the defensive side, I focus on threat detection, monitoring, incident response, and strengthening security posture through proactive defense strategies.

I continuously sharpen my skills through hands-on labs, Capture The Flag challenges, and platforms like Hack The Box, while pursuing industry certifications such as ISC² Certified in Cybersecurity (CC), CompTIA Security+, and Certified Ethical Hacker (CEH) Master.

Beyond learning, I enjoy building security tools, experimenting with automation, and developing projects that simulate real-world security operations. My goal is to contribute to building resilient systems while staying ahead of evolving cyber threats.

When I’m not analyzing traffic or exploiting vulnerabilities, you’ll likely find me solving CTF challenges, researching new attack techniques, or strengthening defensive monitoring capabilities.

Certificates

ISC2 Certified in Cybersecurity
ISC2 Certified in Cybersecurity
CompTIA Security+
CompTIA Security+
Certified Ethical Hacker Master
Certified Ethical Hacker Master
Google Cybersecurity Certificate
Google Cybersecurity Certificate

Hack-The-Box & TryHack-Me Stats

HTB Rank

NOOB

Owned Machines

23

Challenges

01

Skills

Penetration Testing
Penetration Testing
Ethical Hacking
Ethical Hacking
Bug Bounty
Bug Bounty
Web Exploitation
Web Exploitation
SOC Operations
SOC Operations
Incident Response
Incident Response
Digital Forensics
Digital Forensics
Threat Modeling
Threat Modeling
Network Defense
Network Defense
Malware Analysis
Malware Analysis
Python
Code
Bash/Linux CLI
Linux/Windows CLI

Tools

Nmap
Nmap
Metasploit
Metasploit
Burp Suite
Burp Suite
Wireshark
Wireshark
Wazuh
Wazuh
Suricata
Suricata
Netcat
Netcat
Nessus
Nessus
Hashcat
Hashcat
Autopsy
Autopsy
Autopsy
FTK Imager

Programming && Scripting

Bash
Bash
Python
Python
Java
Java
Java
PHP
C
C
C++
C++
HTML
Html
Css
Css
Java Script
Java Script

Projects

AI SOC Monitoring System

Centralized SOC platform with endpoint agents and attack alerts.

Network Intrusion Detector

Python IDS capable of detecting suspicious network behavior.

Malware Detection Tool

File scanning system that analyzes integrity and detects malware.

Cybersecurity Journey

2023 — Started Cybersecurity

Began learning Linux, networking fundamentals and basic security concepts.

2024 — First Certifications

Earned ISC2 Certified in Cybersecurity and began structured learning in security operations and defense.

2025 — Offensive Security Focus

Completed CompTIA Security+ and CEH Master while practicing penetration testing labs.

Present — Red Team Skill Building

Actively solving Hack The Box machines, building security tools and researching vulnerabilities.

Next Goal

Advanced penetration testing certifications and professional red team engagements.

Writeups

Hack The Box Machine Writeup

Enumeration, exploitation and privilege escalation methodology. Comming Soon

Interactive Hacker Terminal

Type 'help' to see commands.

Contact

Email: abdulbarjunejo.prof@gmail.com

GitHub: github.com/Conficker106

LinkedIn: linkedin.com/in/abdulbar