UAC SECURE CONNECTION ONLINE
doomguy-classic

H4CKER HUB

> LEANDROS (HASSAN)

> CYBER-MARINE | PEN TESTER

ARMOR 100%
HEALTH 100%
RANK GURU
FLAGS 220
POINTS 1844

question-mark ABOUT ME

I am a passionate cybersecurity enthusiast pursuing my Master's degree in Cybersecurity at BTU Cottbus. With hands-on experience in ethical hacking, penetration testing, and CTF Machines, I'm dedicated to building secure and intelligent systems. My journey spans from CTF competitions on HackTheBox and TryHackMe to developing security tools and analyzing complex datasets.
Currently based in Germany, I combine theoretical knowledge with practical skills in Linux system administration, network security, web application security, and data analysis. I'm always eager to learn new technologies and tackle challenging security problems.

[ SECURITY CLEARANCES ]

Certification 1
CPTS
(on-going)
Certification 2
CAPE
(on-going)
Certification 3
CWES
(on-going)
Certification 3
CWEE
(on-going)
Certification 3
CDSA
(on-going)
Certification 3
CWPS
(on-going)
Certification 3
CJCA
(on-going)

laptop-terminal UAC TERMINAL

[X] UAC_MAINFRAME_v2.0
SYSTEM BOOT... SECURE CONNECTION ESTABLISHED.
Type 'help' for available commands.

yoda ARSENAL

Intelligent food recipe recommendation system powered by AI and machine learning algorithms for personalized culinary suggestions.
DEPLOY β†’
Advanced port scanning tool for network reconnaissance and vulnerability detection with multi-threading support.
DEPLOY β†’
AI-powered solution to the classic 100 prisoners paradox problem using intelligent optimization algorithms.
DEPLOY β†’
Bible text analysis application using AI for emotional support and spiritual guidance with natural language processing.
DEPLOY β†’
Graphical representation of our solar system in pygame library with accurate planetary orbits and physics simulation.
DEPLOY β†’
AI-based credit and debit card security system providing advanced fraud detection and real-time monitoring.
DEPLOY β†’
Legend of Zelda-inspired game menu created using arcade framework with interactive UI and animations.
DEPLOY β†’
Mood-based music recommendation system using AI voice analysis and emotion detection to suggest perfect playlists.
DEPLOY β†’
Classic Space Invaders-inspired game built in Python pygame with player controls, enemies, and scoring system.
DEPLOY β†’
Interactive visualization of the infamous Wampus world problem in pygame with intelligent agent navigation.
DEPLOY β†’

victory MISSIONS

32 TOTAL
14 EASY
9 MEDIUM
5 HARD
4 INSANE
INSANE
Sorcery
Literally the hardest Linux box with multiple extreme exploit chaining techniques.
Sorcery Avatar
INSANE
Hercules
Insane Windows Active Directory Machine requiring deep environment exploitation.
Hercules Avatar
INSANE
Eloquia
Insane Web Exploitation and heavy vulnerability chaining.
Eloquia Avatar
INSANE
Cobblestone
Insane Linux Minecraft Server-type website exploitation and enumeration.
Cobblestone Avatar
HARD
Pirate
Hard Active Directory Windows box focusing on complex domain privilege escalation.
Pirate Avatar
HARD
Fries
Advanced Windows privilege escalation and service exploitation.
Fries Avatar
HARD
NanoCorp
Corporate network compromise and Active Directory exploitation.
NanoCorp Avatar
HARD
DarkZero
Complex Windows exploitation and network security bypass.
DarkZero Avatar
DATA LOG
HARD
Guardian
Linux security system bypass and deep access control exploitation.
Guardian Avatar
DATA LOG
MEDIUM
VariaType
Linux enumeration and intermediate privilege escalation vectors.
VariaType Avatar
MEDIUM
Interpreter
Source code analysis and interpreter-based exploitation techniques.
Interpreter Avatar
MEDIUM
Pterodactyl
Linux container breakout and web application vulnerabilities.
Pterodactyl Avatar
MEDIUM
Overwatch
Windows domain enumeration and lateral movement execution.
Overwatch Avatar
MEDIUM
AirTouch
Network traffic analysis and Linux privilege escalation.
AirTouch Avatar
DATA LOG
MEDIUM
Browsed
Web exploitation involving client-side vulnerabilities and SSRF.
Browsed Avatar
DATA LOG
MEDIUM
Gavel
Linux configuration flaws and misconfigured service exploitation.
Gavel Avatar
DATA LOG
MEDIUM
Imagery
Image file exploitation and metadata manipulation.
Imagery Avatar
DATA LOG
MEDIUM
Previous
RFI/LFI Middleware vulnerability and terraform privilege escalation.
Previous Avatar
DATA LOG
EASY
Cap
Linux capability exploitation and network packet analysis.
Cap Avatar
DATA LOG
EASY
Kobold
Basic Linux enumeration and simple web exploitation logic.
Kobold Avatar
EASY
CCTV
Camera system misconfigurations and default credential bypass.
CCTV Avatar
EASY
WingData
Data extraction and fundamental Linux privilege escalation.
WingData Avatar
EASY
Facts
Information gathering and straightforward web exploitation.
Facts Avatar
EASY
MonitorsFour
Windows monitoring system exploitation and unauthorized access.
MonitorsFour Avatar
EASY
Eighteen
Windows service exploitation and basic active directory enumeration.
Eighteen Avatar
DATA LOG
EASY
Conversor
Web application exploitation and code injection techniques.
Conversor Avatar
DATA LOG
EASY
TwoMillion
Large-scale exploitation chain involving API bypass and privilege escalation.
TwoMillion Avatar
DATA LOG
EASY
Expressway
API exploitation and authentication bypass techniques.
Expressway Avatar
DATA LOG
EASY
Soulmate
Advanced social engineering concepts and simple privilege escalation.
Soulmate Avatar
DATA LOG
EASY
CodePartTwo
Code review and structured vulnerability exploitation paths.
CodePartTwo Avatar
DATA LOG
EASY
Editor
File editor exploitation and basic path traversal attacks.
Editor Avatar
DATA LOG
EASY
Mr.Robot (THM)
Mr.Robot inspired challenge with web exploitation and privilege escalation.
Mr.Robot Avatar

HALL OF HEROES: ZEUS

Zeus - Our Beloved Cat
2021 β€” 2024

ZEUS

LOYAL COMPANION

Zeus was more than just a petβ€”he was family. With his gentle spirit and loving nature, he brought countless moments of joy and warmth into our lives.

His legacy lives on in our hearts and in the memories we shared. The love we had for him is eternal.

0