Surface Protocol // Online

A white hat fisher slips beneath the bright tropical surface, tracing clean signals, hunting weak points, and descending deeper into the cyber abyss without losing the chill. This single-page dive is designed to feel like a calm ocean on top and a neon terminal at the bottom.

4 Zones Scroll-Reactive Depth Story
SVG Fish White Hat Fedora + Shades
Vanilla JS Typing, Motion, Atmosphere
Mid-Depth // Signal Mapping

Experience, knowledge, and the glow of a terminal-lit current.

The light drops, the borders start glowing, and the fisher shifts from surface scans to practical tactics: secure thinking, challenge-driven reverse work, and scripting that turns repetition into leverage.

Cybersecurity

Defensive Curiosity

I like understanding how systems break so they can be hardened properly, from common web issues to deeper operational habits around enumeration, validation, and responsible disclosure. The goal is always clarity before exploitation, then learning before ego...

CTF // Pwn + Re

Challenge-Driven Analysis

Pwn and reverse engineering sharpen patience. I enjoy following a trail through memory layouts, binaries, and weird program behavior until the logic finally clicks and the flag feels earned instead of lucky. Every solved challenge adds another lens for real-world problem solving...

Python Scripts

Automation That Stays Clean

Python is where I turn repetitive tasks into reliable tools, whether that means parsing outputs, generating payload helpers, organizing lab workflows, or building small utilities that remove friction from learning and experimentation...

The Deep // Portfolio Grid

Project bays inside a submerged neon lab.

This is the quiet pressure zone where the ideas become artifacts. The cards below are ready for your real repo links, project screenshots, and deeper writeups whenever you want to turn placeholders into proof.

Project 01

CTF Writeups

Clean post-competition notes covering methodology, payload evolution, dead ends, and the final solve path so each event becomes a reusable study asset instead of a one-time win...

  • Writeups
  • Notes
  • CTF
Project 02

Malware Analysis Lab

A controlled learning environment for unpacking suspicious behavior, documenting indicators, and studying how binaries persist, communicate, or attempt evasion under observation...

  • Lab
  • Analysis
  • Sandbox
Project 03

Automated Scripts

Lightweight utilities for repetitive tasks such as recon helpers, data cleanup, workflow automation, and small quality-of-life tools that make security practice smoother and more repeatable...

  • Python
  • Automation
  • Toolkit
System Root Access Granted Congratulations. You followed the White Hat Fisher all the way down to the abyss and surfaced with the flag intact.
abyss://root@chillfish.me Flag Captured

The final zone leans fully into the cyberpunk terminal mood: low light, hot red warnings, neon green confirmations, and a clean finish for anyone patient enough to reach the bottom.

  • root@chillfish:~$ init --descent abyss
  • root@chillfish:~$ verify --operator "White Hat Fisher"
  • [ok] fedora synced // sunglasses online // cigar smoke stable
  • root@chillfish:~$ capture --flag ocean_floor.ctf
  • [ok] target reached // integrity maintained // stay chill