Automated recon pipeline combining Nmap, theHarvester, and Subfinder. Outputs structured reports for target enumeration.
NAME Brayy | Krayy
ROLE IT · Cybersecurity · Automation
STATUS ● ONLINE
MISSION Building systems, learning security, and documenting the journey.
UPTIME calculating...
// WHO AM I
A hands-on learner focused on cybersecurity, automation, and building practical digital systems. I spend my time breaking things, learning why they broke, and rebuilding them better.
// BACKGROUND
Self-taught, labs-first approach. I combine formal study with real-world experimentation across CTF challenges, home lab setups, and automation scripting.
// CURRENT FOCUS
- Offensive security fundamentals
- Network analysis & defense
- Python / Bash automation
- Web3 infrastructure & tooling
- Marketing, Documentation & write-ups
// INTERESTS
- AI Agents · AI Automations
- Open-source security tools
- Linux internals
- Digital privacy & OPSEC
── EOF ──
{
"cybersecurity"
: [ ],"networking"
: [ ],"automation"
: [ ],"linux"
: [ ],"web_scripting"
: [ ],"Digital Marketing"
: [ ],"tools"
: [ ]}
total 4 projects | drwxr-xr-x brayy brayy
Documented solutions and methodology notes for TryHackMe rooms. Covers OSINT, privilege escalation, and web exploitation.
Home lab environment with vulnerable VMs, IDS/IPS setup, and network segmentation for offensive/defensive practice.
This site. A terminal-themed personal portfolio and learning journal tracking my progress in IT, security, and automation.
2025-present
Active CTF & Lab Practice
Consistent engagement with TryHackMe, HackTheBox, and Portswigger platforms, focusing on web exploitation, privilege escalation, and OSINT.
2025
Home Lab Setup
Built a segmented home lab environment using WSL and VirtualBox with Kali Linux, Metasploitable, and custom firewall configs.
2024
Automation Scripting Journey
Developed Python, Golang, and Bash scripts for task automation, web scraping, and recon tooling. Built first public GitHub repos.
2024
Linux Deep Dive
Transitioned to Linux as primary OS. Learned networking fundamental and system internals, CLI tooling, and began exploring security-focused distributions.
2018
The Beginning
Started the IT journey — web development, basic web technologies, and the first spark of curiosity about how systems are exploited.
── end of log ──
Showing latest write-ups and notes:
→ TryHackMe: RootMe Write-up — SUID Exploitation & Web Shell Upload
Step-by-step walkthrough of the RootMe room with notes on finding SUID binaries and exploiting file upload filters.
→ Building a Recon Pipeline with Python and Nmap
How I automated target reconnaissance using Python, integrating Nmap output parsing and report generation.
→ Home Lab: Setting Up a Segmented Network for Security Testing
A guide to building a safe, isolated lab environment for penetration testing practice using VirtualBox and pfSense.
→ Linux Privilege Escalation: A Practical Checklist
My personal reference for common privilege escalation vectors: SUID, cron jobs, writable paths, sudo misconfigs, and more.
── view all posts → ──
# ── social_links.env ────────────────────────────────
# Contact and social media links — export to reach out
GITHUB="github.com/brayy"
TWITTER="x.com/brayy"
Instagram="instagram.com/brayy"
YouTube="youtube.com/krayy"
EMAIL="hello@brayy.dev"
# Run: export $(cat social_links.env | xargs) to load
OPEN TO collaborations, etc.
Response time: usually within 24h