888 888 .d88888b. 888 888b d888 8888888888 8888888b. 888 888 d88P" "Y88b 888 8888b d8888 888 888 Y88b 888 888 888 888 888 88888b.d88888 888 888 888 Y88b d88P 888 888 888 888Y88888P888 8888888 888 d88P Y88b d88P 888 888 888 888 Y888P 888 888 8888888P" Y88o88P 888 888 888 888 Y8P 888 888 888 T88b Y888P Y88b. .d88P 888 888 " 888 888 888 T88b Y8P "Y88888P" 88888888 888 888 8888888888 888 T88b
To see the full version of the website,
open it on your computer
_______ ________ _______ _____ / ___ \|\ __ \ / ___ \ / __ \ /__/|_/ /\ \ \|\ \/__/|_/ /|\/_|\ \ |__|// / /\ \ \\\ \__|// / ||/ \ \ \ / /_/__\ \ \\\ \ / /_/__ \ \ \ |\________\ \_______\|\________\ \ \__\ \|_______|\|_______| \|_______| \|__|
Entered USURT to major in Information Security,
where he began to get involved in cryptography
and became acquainted with pentesting
_______ ________ _______ _______ / ___ \|\ __ \ / ___ \ / ___ \ /__/|_/ /\ \ \|\ \/__/|_/ //__/|_/ /| |__|// / /\ \ \\\ \__|// / /__|// / / / /_/__\ \ \\\ \ / /_/__ / /_/__ |\________\ \_______\|\________\\________\ \|_______|\|_______| \|_______|\|_______|
We opened an official IT club at the university,
where I am an administrator and pentest teacher.
We also participate in various projects and
startups in the IT field.
________ ___ ___ _________ ___ ___ ________ _______ |\ _____\\ \|\ \|\___ ___\\ \|\ \|\ __ \|\ ___ \ \ \ \__/\ \ \\\ \|___ \ \_\ \ \\\ \ \ \|\ \ \ __/| \ \ __\\ \ \\\ \ \ \ \ \ \ \\\ \ \ _ _\ \ \_|/__ \ \ \_| \ \ \\\ \ \ \ \ \ \ \\\ \ \ \\ \\ \ \_|\ \ \ \__\ \ \_______\ \ \__\ \ \_______\ \__\\ _\\ \_______\ \|__| \|_______| \|__| \|_______|\|__|\|__|\|_______|
I want to connect my future with pentesting
and I’m doing everything to make this happen
`7MMF' A `7MF' db `7MN. `7MF'MMP""MM""YMM `7MM"""YMM `7MM"""Yb. ` MA ,MA ,V ;MM: MMN. M P' MM `7 MM `7 MM `Yb. VM: ,VVM: ,V ,V^MM. M YMb M MM MM d MM `Mb MM. M' MM. M' ,M `MM M `MN. M MM MMmmMM MM MM `MM A' `MM A' AbmmmqMA M `MM.M MM MM Y , MM ,MP :MM; :MM; A' VML M YMM MM MM ,M MM ,dP' VF VF .AMA. .AMMA..JML. YM .JMML. .JMMmmmmMMM .JMMmmmdP' `7MMF' `7MF' .g8""8q. `7MMF' `7MMM. ,MMF'`7MM"""YMM `7MM"""Mq. `MA ,V .dP' `YM. MM MMMb dPMM MM `7 MM `MM. VM: ,V dM' `MM MM M YM ,M MM MM d MM ,M9 MM. M' MM MM MM M Mb M' MM MMmmMM MMmmdM9 `MM A' MM. ,MP MM , M YM.P' MM MM Y , MM YM. :MM; `Mb. ,dP' MM ,M M `YM' MM MM ,M MM `Mb. VF `"bmmd"' .JMMmmmmMMM .JML. `' .JMML..JMMmmmmMMM .JMML. .JMM.######## ######## ### ######## ####### ######## ### ## #### ## ## ######## ## ## ## ## ## ## ## ## ## ## ## ## ## ## ## ## ## ## ## ## ## ## ## ## ## ## ## ## ## ## ## ## ## ## ## ## ## ## ###### ## ## ## ## ## ## ######## ## ## ## ## ## ## ###### ## ## ## ######### ## ## ## ## ## ## ######### ## ## ## ## ## ## ## ## ## ## ## ## ## ## ## ## ## ## ## ## ## ## ## ######## ######## ## ## ######## ####### ## ## ## ## ######## #### ### ########Skills: What I am currently studying and how much I want to study is measured in % from 1 to 4 -Cryptography and ciphers % -Adm of NIX, WIN systems %% -Security audit software % Kali -Network protocols, services %%% OSI Model -Python, C# %% -Forensics %% -Bash/Shell %%%% -SQL %% Mostly with CTF -HTML, CSS, JS and some PHP %