Fast static pages.
Cyber investigations.
Cyber security solutions.
Custom WordPress themes.
True digital strength is in the details, not just the tools.
Investigating cybercrimes and online harassment, including stalking, hacking, phishing, scams, identity theft, and other offensive acts on the internet. currently this service if offered for free to gain experience in the field.
Testing web applications for security. You can request a test or allow me to investigate potential vulnerabilities detected by my scanner. For legal reasons, your permission is required before any testing. This service is free as I aim to gain experience.
Custom WordPress sites are ideal for those who need dynamic pages and full control over every detail, unlike pre-made themes that can be built or purchased from resellers.
Static web pages are fast, reliable, and ideal for those with minimal content updates and very low cybersecurity risks. Built with best practices and optimized for high page scores.
HTML5, CSS3, JavaScript, PHP, Python, and Burp Suite. empower web development and security professionals to assess and secure their systems.
Deep Web data
The internet is a fun and exciting place, but it comes with risks. Malware such as keyloggers, worms, and various forms of hacking, along with data breaches, can compromise your personal information. If you have an active online presence—whether through social media or other platforms—your data may be at risk of being tracked or exposed. It’s highly recommended to assess your security with a professional if you are concerned about your online safety. If your data has already been compromised, while you may not be able to undo the leak, steps can be taken to seal the breach and enhance your future data security.
Your sensitive data that may already be circulating on the deep web can include passwords, usernames, addresses, phone numbers, email addresses, full names, security question answers, device information, IP addresses, and more.
Application security
If you're a business owner with a web application, it’s crucial to ensure your app is secure. Currently, there are 25 potential vulnerabilities that could affect your site. The larger your website, the greater the risk of each vulnerability being exploited. Keep in mind that any leaked information can be combined and used against you. For instance, exposed usernames and passwords can make brute-force attacks more targeted to your specific patterns.
As a student focused on gaining experience in cybersecurity, I am currently specializing in SQL injection, XSS (Cross-Site Scripting), and Broken Access Controls. I am offering my services for free to help businesses like yours identify and mitigate security risks.
1 March 2025
In this post, I’ll share my findings about BreachForums and its administrator, ‘pompompurin.’ This case reveals some fascinating legal angles and the resilience of cybercriminal networks.
1 March 2025
On February 16, 2024, a data leak containing internal communications, sales materials, and product manuals was uploaded to GitHub. Analysis of the files revealed a connection to i-Soon, a Chinese IT security company. Also, the original repository titled “I-S00N”