Building robust digital defenses and deconstructing threats. First-year BSIS student at Ateneo de Naga University, advancing towards a future in cybersecurity and ethical hacking.
I am an intensely driven first-year student at ADNU, pursuing a Bachelor of Science in Information Systems. My core focus is on the architecture of secure systems and the ethical deconstruction of malicious software.
My journey began in web and application development, which provided a foundational understanding of how systems are built. This naturally evolved into a deeper curiosity about how they can be broken, leading me to the fields of malware development (for analytical purposes) and penetration testing.
I believe that to defend a system, one must first think like an attacker. My goal is to leverage this mindset to contribute to a more secure digital world.
My development workflow utilizes industry-standard tools and environments to ensure efficient, secure, and professional code delivery.
Primary code editor with custom security-focused extensions
For mobile application development and security testing
For advanced Java development and enterprise applications
Distributed version control for tracking code changes
Code hosting platform for version control and collaboration
Command-line interface for Git operations on Windows
Network protocol analyzer for security and troubleshooting
Web application security testing platform
Penetration testing framework for security validation
A self-contained virtual environment designed to safely execute and analyze suspicious scripts (VBS, etc.) and monitor their behavior, network calls, and system modifications.
A web-based application that simulates various phishing techniques to educate users on identifying malicious emails and links.
The very site you are on. A custom-built platform to showcase my work and publish findings on low-level programming and security concepts.
"Understand the Build to Master the Break."
True security isn't about patching holes; it's about architecting systems where holes cannot exist. My development background is the cornerstone of this approach, allowing me to understand the why and how of vulnerabilities from the ground up.
Secure an internship with a security-focused firm or research team to apply my analytical skills in a real-world environment.
Contribute to open-source security tools and obtain industry-recognized certifications (e.g., CEH, CompTIA Security+).
Lead red team operations or advanced threat research, developing novel methodologies to counter emerging cyber threats.
Ready to build a more secure future? Let's connect. I am always interested in discussing opportunities, collaborative projects, or the latest in security research.