Security Researcher
Hi! 👋 I'm Abraham (Neo), a cybersecurity l0veR focused on
security-testing and defensive & offensive security. I create automation scripts, CTF
challenges, and tools to
speed up hacking.
Outside tech, I enjoy running (23+ medallions) and writing CTF writeups &
project insights.
⚡ Fun Facts: I don't drink coffee • I automate everything
• Dream: build a top-tier CTF pentesting toolkit.
~/coursework_
Education and professional training.
Skill Surge Academy
Web & Security TraineeCybersecurity Certification — May 2025
Hack The Box
Remote Security TesterOffensive labs and real-world machine challenges.
TryHackMe
Cybersecurity LearnerTop 1% global rank across all learning paths.
St. Mary's University
BSc Computer ScienceOngoing — Expected graduation 2025.
~/projects_
Core offensive tools, automation frameworks, and web platforms.
~/blog_
Writeups, research notes and tutorials. View all posts
Building Bunna-CTF: Architecture and Design Decisions
How I designed a full attack simulation toolkit from scratch, including flag generation, challenge categories, and scoring logic.
Neo-Recon: Automating the Recon Phase
Deep dive into the Neo-Recon framework — how automated OSINT collection and port scanning are tied together into one workflow.
Steganography Meets AES: Image-Stego-Encryptor
Hiding encrypted payloads inside images — technique overview, code walkthrough, and detection challenges.
TryHackMe Top 1% — My Learning Path
How I approached the TryHackMe platform, what rooms I focused on, and the techniques that helped me break into the top 1%.
~/about_
> cat bio.txt
Security researcher and developer at the intersection of offensive security and infrastructure automation. I build tools, break systems ethically, and document everything.
> tail -n 3 focus.log
[Offensive] Custom exploitation tooling and phishing simulations.
[Defensive] Zero-trust architecture and SIEM pipeline tuning.
[Dev] Python, Bash, web platforms, and automation frameworks.
> echo $STATUS
Available for collaboration and opportunities.