Available for collaboration

sooox

MSc Cybersecurity student. Privacy advocate. Arch Linux user.

cybersecurity · machine learning · full-stack dev · self-hosting

12

Languages

6+

Frameworks

5+

Databases

Current Work

Master's Thesis

Active

Comparative analysis of machine learning models for threat detection in resource-constrained environments.

TensorFlow PyTorch scikit-learn Embedded C++ PlatformIO Jupyter

Skills & Technologies

Languages

Python Python
PHP PHP
JavaScript JavaScript
Java Java
C C
C++ C++
C# C#
Bash Bash
HTML HTML
CSS CSS
Rust Rust
TypeScript TypeScript

Web Development

Backend

Laravel Laravel
Flask Flask
Node.js Node.js
Spring Spring
ASP.NET ASP.NET
Livewire
Tauri Tauri
Elasticsearch Elasticsearch
Streamlit Streamlit

Frontend

Tailwind CSS Tailwind
Alpine.js Alpine.js
jQuery jQuery
Bootstrap Bootstrap
Thymeleaf Thymeleaf
Blade Blade
React React
EJS EJS

Data & AI/ML

AI / Machine Learning

TensorFlow TensorFlow
PyTorch PyTorch
OpenCV OpenCV
scikit-learn scikit-learn
YOLOv8 YOLOv8
pandas pandas

Data Engineering

MS Fabric
dbt
Jupyter Jupyter
Airflow Airflow
MinIO MinIO
Superset Superset

Databases

PostgreSQL PostgreSQL
MySQL MySQL
SQLite SQLite
MongoDB MongoDB
MariaDB MariaDB

DevOps & Infrastructure

Containerization & CI/CD

Docker Docker
Kubernetes Kubernetes
Git Git
Jenkins Jenkins
NGINX NGINX
Linux Linux

Infrastructure

Proxmox Proxmox
Arch Linux Arch Linux
Self-Hosting

Privacy & Security

OSINT
OPSEC
Cryptography
PGP/GPG
TryHackMe TryHackMe

Featured Projects

PrivacyMatters

Anonymous forum platform. No email, no tracking, multi-network support (clearnet, Tor, I2P).

LaravelLivewirePostgreSQLMinIO
Read more

OSINT Studio

Desktop OSINT investigation tool with entity mapping, graph visualization, and relationship analysis.

RustTauriTypeScriptReact
Read more

mdzen

Minimalist, zen-like markdown reader with syntax highlighting, search, and table of contents.

Rustegui
Read more

Breach Browser

High-performance full-text search engine for large text datasets with advanced search syntax.

PythonFlaskElasticsearch
Read more

Cloud IDS

ML-based intrusion detection system trained on the UNSW-NB15 cybersecurity benchmark dataset.

PythonJupyterDocker
Read more

PGP Verification

2FA via PGP challenge-response protocol. Identity verification without KYC or personal data.

PythonStreamlitPGPy
Read more