I build like an engineer—and review like an adversary.
Security is the lens; systems are the playground. I don’t just use tools—I build small ones to understand what’s underneath, then I try to break the assumptions.
Tip: Every project title below is a link (click to inspect).
-
WebMind ↗
Privacy-focused web assistant using locally-hosted LLMs; built to understand retrieval, orchestration, and controlled tool use. -
W0RM-simulator ↗
Controlled worm-behavior simulation to study replication patterns and failure modes in a safe sandbox. -
Wordlist_Generator (CLI) ↗
Target-driven password auditing wordlists from a short seed list + reconnaissance-derived traits (repeatable, controlled expansion). -
TCPDUMP Playbook ↗
Hands-on network traffic analysis notes (tcpdump) for learning how real traffic behaves. -
Offliner (Windows Tkinter GUI) ↗
Offline YouTube downloader built to reduce recommendation-driven distraction and procrastination (local, simple workflow).
Someone who:
- Builds close to the metal (Linux, networks, packets) and automates security work into repeatable tooling.
- Treats tools as things to inspect and re-build—not just install—because understanding beats memorizing.
- Can bring an adversarial mindset without losing engineering discipline (constraints, reproducibility, and clean interfaces).
- Is multi-interested: happy to step into AI systems / robotics work when there’s a real feedback loop—test, measure, break, fix, repeat.
Each item is a link.
- RHCSA (Red Hat Certified System Administrator) ↗
- Microsoft AI-102 ↗
- Google Cybersecurity Professional Certificate ↗
- Pursuing: CAPIJ (Certified API Hacking Junior)
LinkedIn: burhanuddin-cyber ↗
Email: burhanuddin122001@gmail.com






