$about
Cybersecurity practitioner and student focused on adversary tradecrafts, including reverse engineering, malware analysis, networking, OSINT, and operating systems. I have experience in both the technical and industry aspects of cybersecurity, and I actively participate in competitions, CTFs, and related projects. This site documents blogs, writeups, projects, and more from courses, labs, lectures, competitions, and other events.
$socials
$domains
- Reverse Engineering
- Malware Analysis and Development
- Assembly
- C/C++
- Binary Exploitation & pwning
- OSINT & Reconnaissance
- Digital Forensics
- Protocol & Network Analysis
- Cryptography
- OS Internals
- CTFs & Writeups
$projects
A funded project by the Ministry of Education, Science, Technology, and Innovation of Kosovo focused on developing an interactive platform to improve cyber hygiene and awareness among young people (ages 15–25) in Kosovo. The project aims to build practical cybersecurity knowledge and foster good digital habits through educational content and simulations, addressing the country's lack of structured cybersecurity awareness initiatives. It combines cybersecurity, information science, ICT in education, and digital pedagogy, utilizing a "learning by doing" approach to help young people protect themselves against threats such as phishing and ransomware. The platform includes interactive modules, scenario-based simulations, and gamified learning paths to keep learners engaged while developing critical digital skills. It also aims to promote a culture of cybersecurity within the community, helping young people understand the impact of cybersecurity on their daily lives and future careers. This project highlights the role of education and technology in strengthening digital resilience in Kosovo.
Organized and managed a Capture The Flag (CTF) competition for RIT Kosovo students as President of the Cybersecurity Club. Designed and deployed custom CTF challenges across categories including cryptography, steganography, OSINT, reverse engineering, memory capture analysis, buffer overflow, and network traffic analysis. The event provided hands-on experience to participants, helping them develop practical cybersecurity skills in a collaborative and competitive environment.
Developing a Multiple Agent System (MAS) for automated web vulnerability scanning, penetration testing, and reporting. The system uses distributed autonomous agents to perform tasks such as scanning, analysis, and report generation in parallel, improving scalability, coverage, and efficiency during security assessments. It aims to streamline penetration testing workflows while providing clear, actionable reports to support remediation and enhance overall web security posture.
$certifications