/$$ /$$ /$$$$$$ /$$ /$$ /$$$$$$ /$$$$$$$$ /$$$$$$$ /$$ /$$
| $$ / $$ /$$__ $$| $$ | $$|_ $$_/| $$_____/| $$__ $$ | $$$ /$$$
| $$/ $$/| $$ \ $$| $$ | $$ | $$ | $$ | $$ \ $$ | $$$$ /$$$$
\ $$$$/ | $$$$$$$$| $$ / $$/ | $$ | $$$$$ | $$$$$$$/ | $$ $$/$$ $$
>$$ $$ | $$__ $$ \ $$ $$/ | $$ | $$__/ | $$__ $$ | $$ $$$| $$
/$$/\ $$| $$ | $$ \ $$$/ | $$ | $$ | $$ \ $$ | $$\ $ | $$
| $$ \ $$| $$ | $$ \ $/ /$$$$$$| $$$$$$$$| $$ | $$ | $$ \/ | $$ /$$
|__/ |__/|__/ |__/ \_/ |______/|________/|__/ |__/ |__/ |__/|__/
Cybersecurity enthusiast focused in threat analysis, network security, penetration testing, and CTF's.
"Programming is the art of telling another human being what one wants the computer to do." ― Donald E. Knuth