\ \      / /__| | ___ ___  _ __ ___   ___ 
                \ \ /\ / / _ \ |/ __/ _ \| '_ ` _ \ / _ \
                 \ V  V /  __/ | (_| (_) | | | | | |  __/
                  \_/\_/ \___|_|\___\___/|_| |_| |_|\___|


                                                                           

[SYSTEM] Initializing security system...

[BOOT] Loading red team modules [OK]

[INIT] Mounting security tools [OK]

[LOAD] Starting penetration testing services [OK]

[EXEC] Loading portfolio.sh [OK]

[INIT] Initializing cybersecurity interface [OK]

[DONE] System ready for ethical hacking [READY]

cybersecurity enthusiast · aspiring red teamer

HUSNAIN

Passionate about offensive security — learning & practicing ethically

Cybersecurity focus areas:

> Web Application Penetration Testing

> Red Team Methodologies

> Cryptography & Network Security

> CTF Challenges & Vulnerable Labs

 

$ cat contact.txt

GitHub: github.com/thehusnain · by Husnain


$ _|

View Projects Get In Touch signed: husnain

About Me

Hi — I'm Husnain, a passionate cybersecurity enthusiast and BS Computer Science student from Haripur, Pakistan. I started my cybersecurity journey 4 months ago and have been dedicating my time to learning, practicing, and improving every single day.

Although I'm still in the learning phase, I'm proud to be ranked in the top 5% on TryHackMe. I actively participate in CTF challenges, build my own vulnerable labs for legal practice, and focus mainly on web application penetration testing and cryptography fundamentals.

I use Kali Linux as my primary OS for security testing and exploration, and I strongly believe in ethical hacking, responsible learning, and continuous growth. My tech stack includes Burp Suite, Wireshark, GitHub, Metasploit, Gobuster, and various cryptography tools.

about.js
const securityEnthusiast = {
  name: "Husnain",
  role: "Cybersecurity Learner & Aspiring Red Teamer",
  location: "Haripur, Pakistan",
  education: "BS Computer Science",
  experience: "4 months in cybersecurity",
  achievements: [
    "Top 5% on TryHackMe",
    "Cisco Cybersecurity Certificate",
    "Active CTF Participant"
  ],
  skills: [
    "Web Penetration Testing",
    "Cryptography",
    "Network Security",
    "Vulnerability Assessment",
    "Kali Linux"
  ],
  tools: [
    "Burp Suite",
    "Wireshark",
    "Metasploit",
    "Nmap",
    "SQLMap",
    "Gobuster"
  ],
  funFact: "I build vulnerable labs and solve CTFs to test new techniques ethically."
};

TryHackMe Statistics

Rank & Achievements

Global Ranking Top 5%
Rooms Completed 45+
Learning Paths 3

Technical Skills

Web Security 75%
Network Security 70%
Cryptography 65%

Tool Proficiency

Burp Suite 75%
Wireshark 70%
Kali Linux Tools 80%

TryHackMe Profile

Username: thephantomdelux • Rank: Top 5%

Experience

Self-Learning & Practice

2025 - Present

Intensive self-study in cybersecurity through TryHackMe, CTF challenges, and vulnerable lab environments. Building practical skills in web penetration testing, network security, and cryptography.

Vulnerable Lab Creation

2025 - Present

Creating and maintaining personal vulnerable labs for legal practice and testing of security techniques. Implementing various vulnerabilities to understand exploitation and remediation methods.

CTF Participation

2025 - Present

Regular participation in Capture The Flag competitions to enhance practical skills. Solving challenges in web exploitation, cryptography, reverse engineering, and forensics.

Education

BS Computer Science

2023 - Present

Pursuing Bachelor's degree in Computer Science with focus on cybersecurity fundamentals, networking, operating systems, and secure software development principles.

Cybersecurity Self-Learning

2025 - Present

Dedicated self-study through online platforms including TryHackMe, Cisco Networking Academy, and various cybersecurity resources. Focus on practical, hands-on learning.

Certifications

🛡️
Threat Intelligence
Red Team Leaders

Certified Threat Intelligence & Governance Analyst (CTIGA)

Certified in threat intelligence methodologies, governance frameworks, and security analysis techniques. Completed all requirements and passed the comprehensive examination.

🔐
Cybersecurity
Cisco

Introduction to Cybersecurity

Completed comprehensive introduction to cybersecurity covering threats, vulnerabilities, cryptography basics, and network security fundamentals.

🏆
Achievement
TryHackMe

Top 5% Global Ranking

Achieved top 5% ranking among TryHackMe's global community through consistent learning and completion of security challenges.

🌐
Networking
Cisco

Networking Basics

Fundamental networking knowledge including TCP/IP, network protocols, routing, switching, and network architecture essentials.

Projects

🛡️ WebShield Scanner

A comprehensive web application security scanner that tests websites for vulnerabilities using Nmap, SQLMap, SSLScan, and Nikto. Features automated report generation with AI analysis.

Nmap SQLMap SSLScan Nikto AI Reporting
Live Demo → Source Code →

🧪 Vulnerable Practice Lab

Personal vulnerable lab environment for practicing penetration testing techniques legally. Includes intentionally vulnerable web applications and network services for skill development.

Docker Kali Linux Web Exploitation Network Security
Explore Lab →

🔐 Cryptography Toolkit

Collection of cryptography tools and scripts for encryption, decryption, and cryptographic analysis. Includes implementations of various ciphers and cryptographic protocols.

Python Cryptography Encryption Security
Get Access →

Learning Journey

September 2025

My First 4 Months in Cybersecurity — husnain

Beginner Learning Journey

Reflections on my initial cybersecurity journey, from basic concepts to achieving top 5% on TryHackMe. Challenges faced and lessons learned...

Read More →
October 10, 2025

Web Penetration Testing Fundamentals

Web Security Penetration Testing OWASP

Understanding common web vulnerabilities and how to ethically test for them. Covering SQL injection, XSS, CSRF, and security headers...

Read More →
October 5, 2025

Building a Home Security Lab

Lab Setup Practice Legal Testing

Step-by-step guide to creating your own vulnerable lab environment for legal security practice. Tools, configurations, and safety considerations...

Read More →

Get In Touch

Signed by husnain