OPERATIONAL STATUS
Primary OS
ARCH LINUX
Readiness
15%
Focus
CYBER-BIO-MILNET
Status
DORMANT [Until Apr 2026]
LOCATION & IDENTITY
31.0675° N, 81.3119° E, The Greater Himalayas

Username: [RDBHVR]

Specialization: Systems Architecture, Cybersecurity, Linux Administration (Depth not yet established, but there is enough breadth for interoperablity.)

Methodology: Manual mastery before automation. Understanding before implementation. Control over convenience. Gita 2.47. Use short and sharp words.

CORE PRINCIPLES
  • Deep system understanding over tool dependency
  • Manual configuration and scripting mastery
  • Deliberate, precision-focused execution
  • Documentation as operational infrastructure
  • Failure-driven learning and continuous improvement
  • Security hardening and threat intelligence. Time insuffice for dealing.
CURRENT FOCUS AREAS
  • Penetration testing fundamentals and methodologies
  • Advanced Linux kernel and systems administration
  • Window manager customization and ricing
  • Cybersecurity tool development and integration
  • Automated infrastructure deployment
  • Threat modeling and security architecture
PROFILE
DOSSIER
Call Sign
[RDBHVR]
Location
The Greater Himalayas, India
To be specialised in
Mil | Bio-Cybersecurity & Systems Architecture
Primary OS
Arch Linux (custom, manual), Archcraft downgraded in unusual way
Window Manager
Bspwm + Sxhkd + Polybar (Rices will soon be available for usage)
Shell
Bash, Zsh
TECHNICAL FOUNDATION : (DORMANT)
  • OS Administration: Arch Linux package management, kernel configuration, system hardening
  • Window Management: Bspwm rice optimization, polybar customization, keybinding architecture
  • Security: Penetration testing fundamentals, vulnerability assessment, threat modeling
  • Development: Bash scripting, Python automation, HTML/CSS/JavaScript web dev
  • Infrastructure: Dotfile orchestration, configuration management, reproducible deployments
OPERATIONAL VALUES
Mastery First
Deep understanding before using any tool
Control Architecture
Manual setup, strategic automation. Only doctrine = Gita 2.47, Boundless Action.
Precision Execution
Deliberate planning and careful implementation
Intelligence from Failure
Systematic troubleshooting and documentation
System Dominance
Complete knowledge of every configuration
TECHNICAL CAPABILITIES
Linux Internals & Administration
Networking & Protocol Analysis
Penetration Testing & Enumeration
Web Exploitation & Analysis
Bash Scripting & Automation
Rust Foundations & Basics
Python Systems Programming
Frontend Development (HTML/CSS/JS)
TECHNICAL ARSENAL
Scripting
Lua
Bash
Python
Node.js
Security
Nmap
John
Metasploit
Web Stack
HTML/CSS
JavaScript
Three.js
DevOps
Git
Docker
Pacman
APT
LEARNING TRAJECTORY
  • Beginner in cybersecurity and exploitation, all to be initialized completely @ Apr 2026.
  • Linux Fundamentals and Bash Scripting to be mastered, a few milestones away from it.
  • Threat intelligence analysis and frameworks, use matplotlib to plot trajectory, play some chess in pychess against a trained engine to train my brain.
  • Integrate Python OOP and Lua's Flexibility along with Bash internals to create systems.
  • Building config file based games that runs purely via your choice with interactive and suspense filled storyline.
  • Learn git toolchains and develop as much as FOSS I could.
ACTIVE OPERATIONS
▸ OCTAGON - Governmental Efficiency Framework
It is a governmental framework, currently an idea to put in collab with democratic countries to harden security and enforce crimeless and corruptionless covert defense.
Military Idea Framework Security
▸ Eww Dashboard System
Custom widget and dashboard framework built with Eww. Delivers real-time system metrics, threat intelligence feeds, and command execution interfaces. Fully themeable with dark aesthetic cybersecurity focus for immersive operational displays. I want to build it, it is currently an idea which I am learning and will learn soon.
Eww Widgets Dashboard UI/UX Real-time
▸ Bspwm Rice Configuration

Maximally optimized Bspwm window manager environment with comprehensive keybinding architecture, polybar integration, and aesthetic refinement. Designed for rapid workspace management and penetration testing operational workflows. It is a customisation of already customised rice as per my requirements.

visit
Bspwm Sxhkd Polybar Ricing
▸ Neovim Configuration

This is my personal neovim configuration custom made for fast workflows without bloating. It is super easy to install with a setup script. Added dashboard, syntax highlighting wrapping and auto indentation enabled. Optimized menu, fuzzy file finder and Telescope extension enabled.

visit
Neovim Configuration IDE Workflows
▸ Nvchad Configuration

I hate tweaking configs. It consumes too much of time, yet I do it sometimes to customise and speedup my workflow. This is another thing like that - Nvchad (A Popular Neovim Configuration) tuned as per my needs.

visit
Neovim Nvchad Tweak IDE Workflows
▸ Archcraft ISO Builder
Automated system imaging utility that converts configured Arch Linux installations into distributable ISOs. Enables rapid redeployment of fully configured environments across multiple systems with identical hardening and tooling. Efficiently downgrade Archcraft into Arch Linux, saving your precious time from installation of Arch and it's customisation AKA ricing it's config files. (I would recommend manual installation. I had to do it in another way due to time constraints.)
Arch Linux ISO Builder Automation Deployment
▸ [RDBHVR] Web Portfolio (This Website)

Responsive military-themed cybersecurity portfolio website. Built with vanilla HTML/CSS/JavaScript featuring modular navigation, real-time status displays, and dynamic content loading. Optimized for both desktop and mobile command interfaces. Stylesheet dynamically generated by Perplexivity, HTML code fully written by self. CSS to be used as a template for various projects.

revisit
Source
HTML/CSS JavaScript Responsive UI Design
▸ The bspwm-wiki

bspwm-wiki is a community-maintained, beginner-firendly documentation project for bspwm. It focuses on explaining concepts, configuration, and practical workflows in a clear and approachable way - beyond minimaal manpages.

visit
Source
Markdown Bspwm Documentation Community
▸ Three.js 3D Graphics Engine (DORMANT)
Interactive 3D web graphics framework for cybersecurity threat visualization and data representation. Implements advanced rendering techniques, particle systems, and real-time data binding for immersive command center displays.
Three.js Dormant 3D Graphics Visualization
TRAINING PLATFORMS
HackTheBox (HTB)
DORMANT

Ongoing penetration testing lab practice and exploitation techniques. 2 Machines pwned, not an expert in any of these fields, just a student and always a learner.

Local Exploit Labs
DEPLOYED

Custom isolated lab environments for vulnerability research and analysis. Deployed DAMN Vulnerable Web Applications in Docker and Metasploitable2 in QEMU. Training will start soon.

CTF Competition
NONE

Competitive capture-the-flag exercises and advanced challenge solving. Need to reach milestones before procceeding with CTFs, i.e, I need to learn internals in the first place.

SYSTEM LOGS
[BOOT] System initialized
HARDWARE & INFRASTRUCTURE
OS
Arch Linux (rolling release, custom build)
Window Manager
Bspwm + Sxhkd keybindings
Shell
Bash and Zsh with custom aliases and functions
Terminal
Alacritty with dark theme
Editor
Nano with extensive plugins
Package Manager
Pacman with AUR support
Version Control
Git with comprehensive repositories
SECURE COMMUNICATION
CONTACT CHANNELS
Primary Email
rdbhvr.archlinux.2026@gmail.com
GitHub Repository
github.com/rdbhvr-001
Physical Location
The Greater Himalayas, India
ACTIVE
PROTOCOL PREFERENCES
  • Encrypted communication strongly preferred. Proton Mail, Gmail, DNMX.
  • Detailed technical inquiries always welcome
  • Collaboration opportunities in cybersecurity and systems administration. If you can provide me with some learning resources, I would be able to develop more comprehensive FOSS projects and deployments soon after education.
  • System architecture discussions and technical mentorship
  • Open-source contribution and project partnership. To join the LFX.
OPERATIONAL NOTES

This operator prioritizes technical depth and system mastery. Conversations should be detailed, specific, and focused on architectural principles. Expect thorough analysis and deliberate execution. Short-cuts and blind tool usage are fundamentally rejected in favor of understanding-first methodology.