Skip to content
View zedttxj's full-sized avatar

Block or report zedttxj

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
zedttxj/README.md

πŸ‘‹ Hi, I'm Nguyen Anh Minh (zedttxj)

πŸš€ Cybersecurity Enthusiast | CTF Player (Ranked 140th in picoCTF 2024) picoCTF Profile πŸ” Passionate about cryptography, ethical hacking, and problem-solving
πŸ“š ## πŸ” Current Research Interests I'm currently exploring advanced mathematics topics that are deeply connected to cryptography and algorithms, including:

  • πŸ”’ Number Theory (modular arithmetic, primality testing, RSA, elliptic curves)
  • πŸ› Abstract Algebra (groups, rings, fields, finite fields for cryptography)
  • πŸ”  Linear Algebra & Matrices (applications in coding theory, machine learning)
  • 🧠 Algorithmic Complexity (graph theory, optimization, NP-completeness)

πŸ† Achievements

  • Solved advanced cryptography & security challenges on pwn.college and conducted MITM & penetration tests using Wireshark, pwntools, and Netcat
  • Developed a lightweight online collaboration platform secured by three back-end servers and a custom locally signed PKI, designed so that anyone can integrate it with just one line of JavaScript
  • Undergraduate Researcher at TAMUT, submitted 2 papers to IEEE Transactions on Image Processing and Journal of Algebraic Combinatorics
  • Executive Secretary at IEEE TAMUT, organizing tech events & competitions

πŸ“‚ Featured Projects

πŸ”Ή Cryptography Pen-testing – GitHub Repo
πŸ”Ή Web-Security Exploits & Network-Traffic Interceptions – GitHub Repo
πŸ”Ή Computer Software Introspection – GitHub Repo
πŸ”Ή Incident Response Analysis - Follina – BTLO
πŸ”Ή Secure Batch File Processor – GitHub Repo
πŸ”Ή Bayer Filter - Image Processing with MATLAB – GitHub Repo
πŸ”Ή Azure Credential Leak Detection – GitHub Repo
πŸ”Ή Web-based Markdown-to-LaTeX Converter – GitHub Repo
πŸ”Ή Policy Development & GRC Implementation – GitHub Repo
πŸ”Ή DevOps & Collaboration Editor – GitHub Repo
πŸ”Ή Cybersecurity & Cloud Security – GitHub Repo

βš™οΈ All projects are designed with a focus on security, automation, academic research, and real-world incident simulation. I continuously update these based on lessons from CTFs, GRC training, and real use cases.

πŸ“« Contact

πŸ“§ Email: nguy1587@purdue.edu
πŸ”— LinkedIn Profile
πŸ”— PicoCTF Profile
πŸ”— pwn.college Profile

πŸ“œ Certifications

  • πŸ•΅οΈ SOC Analyst Certification - TCM Security
  • πŸ€– Stanford Machine Learning (AI) - Coursera (by Andrew Ng)
  • πŸ” Google Cybersecurity Professional Certificate
  • πŸŽ“ Security+ Course (Texas A&M University-Texarkana) - 4.0 GPA
  • πŸ“– CISSP Training (Certified Information Systems Security Professional)

πŸ› οΈ Skills

  • Programming: C++, Python, JavaScript, Java, Assembly
  • Operating Systems: Linux (Advanced command-line usage, system administration, shell scripting)
  • Linux Tools: Bash, SSH, Netcat, GDB, Nmap, tshark, tcpdump, ping, nc, shell variables, manage permissions, handle user groups, chain commands, inject and remove custom commands, link and find files, perform file globbing, and pipe commands
  • Security: Web Pen-testing, Cryptography, SIEM (Splunk), Wireshark
  • Networking: CCNA training, VPN, Firewall, Packet Analysis

πŸ“š Currently Studying

  • πŸŽ“ Bachelor of Science in Cybersecurity – Purdue University's West Lafayette

πŸ† Competitive Programming & Algorithms

  • πŸ₯‡ USACO Gold-Level Algorithms (Graph Theory, DP, Greedy, Data Structures)
  • πŸ”’ Advanced Algorithm Design (Divide & Conquer, Network Flow, Bit Manipulation)
  • πŸ“Š Optimized Problem Solving (C++ STL, Fast I/O, Complexity Analysis)

Pinned Loading

  1. Useful-Commands Useful-Commands Public

    Useful commands for solving ctf problems

  2. Computer-Software-Introspection Computer-Software-Introspection Public

    Python

  3. Web-Security-Exploits Web-Security-Exploits Public

    Python