Username: [RDBHVR]
Specialization: Systems Architecture, Cybersecurity, Linux Administration (Depth not yet established, but there is enough breadth for interoperablity.)
Methodology: Manual mastery before automation. Understanding before implementation. Control over convenience. Gita 2.47. Use short and sharp words.
Maximally optimized Bspwm window manager environment with comprehensive keybinding architecture, polybar integration, and aesthetic refinement. Designed for rapid workspace management and penetration testing operational workflows. It is a customisation of already customised rice as per my requirements.
visitThis is my personal neovim configuration custom made for fast workflows without bloating. It is super easy to install with a setup script. Added dashboard, syntax highlighting wrapping and auto indentation enabled. Optimized menu, fuzzy file finder and Telescope extension enabled.
visitI hate tweaking configs. It consumes too much of time, yet I do it sometimes to customise and speedup my workflow. This is another thing like that - Nvchad (A Popular Neovim Configuration) tuned as per my needs.
visitResponsive military-themed cybersecurity portfolio website. Built with vanilla HTML/CSS/JavaScript featuring modular navigation, real-time status displays, and dynamic content loading. Optimized for both desktop and mobile command interfaces. Stylesheet dynamically generated by Perplexivity, HTML code fully written by self. CSS to be used as a template for various projects.
revisitOngoing penetration testing lab practice and exploitation techniques. 2 Machines pwned, not an expert in any of these fields, just a student and always a learner.
Custom isolated lab environments for vulnerability research and analysis. Deployed DAMN Vulnerable Web Applications in Docker and Metasploitable2 in QEMU. Training will start soon.
Competitive capture-the-flag exercises and advanced challenge solving. Need to reach milestones before procceeding with CTFs, i.e, I need to learn internals in the first place.
This operator prioritizes technical depth and system mastery. Conversations should be detailed, specific, and focused on architectural principles. Expect thorough analysis and deliberate execution. Short-cuts and blind tool usage are fundamentally rejected in favor of understanding-first methodology.