Iβm a cybersecurity learner focused on:
- π Web application penetration testing
- π³οΈ Red team recon & automation
- π§© Cryptography & steganography challenges
- 𧬠DFIR (Digital Forensics & Incident Response)
- π οΈ Building tooling to accelerate offensive workflows
Currently:
- π§ Building: Phantom_Recon (modular red-team recon automation)
- π― Grinding paths & rooms on TryHackMe to deepen practical knowledge
- π₯ Competing with my CTF team: Binary_Beasts
- π§ Always looking for harder problems to reverse, decode, break (ethically), or defend
Pronouns: he/him
Languages: Python C++
Pentest / Offensive: Burp Suite Gobuster Nmap wfuzz sqlmap
Crypto / Stego: CyberChef Ghidra HxD zsteg steghide
Reverse / Forensics: Autopsy Brim NetworkMiner Wireshark strings binwalk
Cracking: John the Ripper hashcat
Other: Git Linux ghidra
I actively participate in CTFs to sharpen fundamentals through real-world style challenges.
Events / Platforms:
- π― PicoCTF
- π― US Cyber Games Competitive Season
- π― Hackfinity CTF
- π― Industrial Intrusion CTF
π Team writeups & journey:
(Replace this with the correct working link β your current URL contains spaces, which break the link.)
https://waris206.github.io/Binary_Beasts-CTF-Writeups/
If the repository/page has a different slug, update accordingly.
A modular recon automation tool aimed at:
- Enumerating domains / subdomains
- Passive + active data collection
- Filtering noise to highlight exploitable surfaces
- Designed for extensibility (plug-in style modules)
Planned Stack / Features:
- Python-based module orchestration
- Async tasks (e.g.,
aiohttp) - Output normalization (JSON + Markdown report generation)
- Optional integration with tools like
amass,subfinder,httpx
(Once you publish, add: demo GIF, quickstart, core modules table.)
I prefer:
- Breaking β Documenting β Automating β Teaching
- Converting manual recon steps into reproducible tooling
- Keeping notes in structured, repeatable formats (Markdown + scripts)
- Diving deeper when something βjust worksβ (understanding the why)
| Goal | Status | Notes |
|---|---|---|
| Launch Phantom_Recon MVP | π§ͺ In progress | Core module design underway |
| Publish 10+ structured CTF writeups | π Ongoing | Focus: web + crypto |
| Build a small DFIR case study repo | β³ Planned | PCAP + timeline + narrative |
| Earn higher TryHackMe rank | π Active | Consistent daily progress |
Open to:
- Building lightweight security tooling
- Joint CTF participation
- Writing / reviewing security content
- Experimental research (enumeration, obfuscation, detection)
If you have an idea β open an issue or send an email.
- π§ Email: akashwaris.cybersec@gmail.com
- πΌ LinkedIn: Muhammad Akash Waris
- π°οΈ TryHackMe: XORgeist
All activities I conduct are within legal and ethical boundaries.
Content here is for educational and defensive security purposes only.
Never test systems without explicit authorization.