brayy@portfolio ~ bash
nav ~/ about skills projects exp blog contact |
brayy@portfolio:~$
brayy@portfolio:~$ ./init-portfolio.sh
 ██████╗ ██████╗  █████╗ ██╗   ██╗██╗   ██╗     ██╗    ██╗  ██╗██████╗  █████╗ ██╗   ██╗██╗   ██╗
 ██╔══██╗██╔══██╗██╔══██╗╚██╗ ██╔╝╚██╗ ██╔╝     ██║    ██║ ██╔╝██╔══██╗██╔══██╗╚██╗ ██╔╝╚██╗ ██╔╝
 ██████╔╝██████╔╝███████║ ╚████╔╝  ╚████╔╝      ██║    █████╔╝ ██████╔╝███████║ ╚████╔╝  ╚████╔╝ 
 ██╔══██╗██╔══██╗██╔══██║  ╚██╔╝    ╚██╔╝       ██║    ██╔═██╗ ██╔══██╗██╔══██║  ╚██╔╝    ╚██╔╝  
 ██████╔╝██║  ██║██║  ██║   ██║      ██║        ██║    ██║  ██╗██║  ██║██║  ██║   ██║      ██║   
 ╚═════╝ ╚═╝  ╚═╝╚═╝  ╚═╝   ╚═╝      ╚═╝        ╚═╝    ╚═╝  ╚═╝╚═╝  ╚═╝╚═╝  ╚═╝   ╚═╝      ╚═╝   
          

NAME Brayy | Krayy

ROLE IT · Cybersecurity · Automation

STATUS ● ONLINE

MISSION Building systems, learning security, and documenting the journey.

UPTIME calculating...

──────────────────────────────────────────

Available commands:

[1] about [2] skills [3] projects [4] experience [5] blog [6] contact

Tip: press >_ in the nav bar to open the command terminal.

brayy@portfolio:~$ cat about.txt
# ── about.txt ──────────────────────────────────────

// WHO AM I

A hands-on learner focused on cybersecurity, automation, and building practical digital systems. I spend my time breaking things, learning why they broke, and rebuilding them better.


// BACKGROUND

Self-taught, labs-first approach. I combine formal study with real-world experimentation across CTF challenges, home lab setups, and automation scripting.

// CURRENT FOCUS

  • Offensive security fundamentals
  • Network analysis & defense
  • Python / Bash automation
  • Web3 infrastructure & tooling
  • Marketing, Documentation & write-ups

// INTERESTS

  • AI Agents · AI Automations
  • Open-source security tools
  • Linux internals
  • Digital privacy & OPSEC

── EOF ──

brayy@portfolio:~$ cat skills-stack.json

{

"cybersecurity"

: [
Pentesting Basics OSINT CTF Recon Nmap Burp Suite Metasploit
],

"networking"

: [
TCP/IP DNS Wireshark Firewall Config VPN Network Hardening
],

"automation"

: [
Python Bash Shell Scripting Cron Jobs Task Automation
],

"linux"

: [
Ubuntu Kali Linux Arch CLI Mastery Systemd SSH
],

"web_scripting"

: [
HTML/CSS JavaScript Python Go Git REST APIs Web Scraping
],

"Digital Marketing"

: [
Content Strategy Social Media Growth Community Building Copywriting Campaign Strategy
],

"tools"

: [
VS Code Obsidian Docker GitHub Notion WSL VirtualBox Canva Google Trends
]

}

brayy@portfolio:~/projects$ ls -la

total 4 projects | drwxr-xr-x brayy brayy

⬡ recon-automation-toolkit ● active

Automated recon pipeline combining Nmap, theHarvester, and Subfinder. Outputs structured reports for target enumeration.

stack: Python · Bash · Nmap role: Solo Dev
→ GitHub → Blog
⬡ writeup-collection ● in-progress

Documented solutions and methodology notes for TryHackMe rooms. Covers OSINT, privilege escalation, and web exploitation.

stack: Markdown · TryHackMe · HackTheBox · Portswigger role: Author
→ X → Blog
⬡ personal-cyber-lab ● active

Home lab environment with vulnerable VMs, IDS/IPS setup, and network segmentation for offensive/defensive practice.

stack: VirtualBox · Kali · pfSense · WSL · Ubuntu role: Builder
→ Blog
⬡ portfolio-journal ● active

This site. A terminal-themed personal portfolio and learning journal tracking my progress in IT, security, and automation.

stack: HTML · CSS · JS role: Designer & Dev
→ GitHub
brayy@portfolio:~$ cat journey.log

2025-present

Active CTF & Lab Practice

Consistent engagement with TryHackMe, HackTheBox, and Portswigger platforms, focusing on web exploitation, privilege escalation, and OSINT.

TryHackMe HackTheBox Portswigger

2025

Home Lab Setup

Built a segmented home lab environment using WSL and VirtualBox with Kali Linux, Metasploitable, and custom firewall configs.

Infrastructure Networking

2024

Automation Scripting Journey

Developed Python, Golang, and Bash scripts for task automation, web scraping, and recon tooling. Built first public GitHub repos.

Python Go Bash

2024

Linux Deep Dive

Transitioned to Linux as primary OS. Learned networking fundamental and system internals, CLI tooling, and began exploring security-focused distributions.

Linux Self-Taught

2018

The Beginning

Started the IT journey — web development, basic web technologies, and the first spark of curiosity about how systems are exploited.

Origin

── end of log ──

brayy@portfolio:~/writeups$ cat documentations.md

Showing latest write-ups and notes:


2025-04-20 CTF

→ TryHackMe: RootMe Write-up — SUID Exploitation & Web Shell Upload

Step-by-step walkthrough of the RootMe room with notes on finding SUID binaries and exploiting file upload filters.

2025-03-15 Automation

→ Building a Recon Pipeline with Python and Nmap

How I automated target reconnaissance using Python, integrating Nmap output parsing and report generation.

2025-02-28 Networking

→ Home Lab: Setting Up a Segmented Network for Security Testing

A guide to building a safe, isolated lab environment for penetration testing practice using VirtualBox and pfSense.

2025-01-10 Linux

→ Linux Privilege Escalation: A Practical Checklist

My personal reference for common privilege escalation vectors: SUID, cron jobs, writable paths, sudo misconfigs, and more.

── view all posts → ──

brayy@portfolio:~$ cat social-links.env

# ── social_links.env ────────────────────────────────

# Contact and social media links — export to reach out


GITHUB="github.com/brayy"

TWITTER="x.com/brayy"

Instagram="instagram.com/brayy"

YouTube="youtube.com/krayy"

EMAIL="hello@brayy.dev"


# Run: export $(cat social_links.env | xargs) to load

OPEN TO collaborations, etc.

Response time: usually within 24h

brayy@portfolio:~$ exit
Connection closed. Session saved. — — built by Brayy
● ssh-rsa 2048 | uptime: 0s