π Cybersecurity Enthusiast | CTF Player (Ranked 140th in picoCTF 2024) picoCTF Profile
π Passionate about cryptography, ethical hacking, and problem-solving
π ## π Current Research Interests
I'm currently exploring advanced mathematics topics that are deeply connected to cryptography and algorithms, including:
- π’ Number Theory (modular arithmetic, primality testing, RSA, elliptic curves)
- π Abstract Algebra (groups, rings, fields, finite fields for cryptography)
- π Linear Algebra & Matrices (applications in coding theory, machine learning)
- π§ Algorithmic Complexity (graph theory, optimization, NP-completeness)
- Solved advanced cryptography & security challenges on pwn.college and conducted MITM & penetration tests using Wireshark, pwntools, and Netcat
- Developed a lightweight online collaboration platform secured by three back-end servers and a custom locally signed PKI, designed so that anyone can integrate it with just one line of JavaScript
- Undergraduate Researcher at TAMUT, submitted 2 papers to IEEE Transactions on Image Processing and Journal of Algebraic Combinatorics
- Executive Secretary at IEEE TAMUT, organizing tech events & competitions
πΉ Cryptography Pen-testing β GitHub Repo
πΉ Web-Security Exploits & Network-Traffic Interceptions β GitHub Repo
πΉ Computer Software Introspection β GitHub Repo
πΉ Incident Response Analysis - Follina β BTLO
πΉ Secure Batch File Processor β GitHub Repo
πΉ Bayer Filter - Image Processing with MATLAB β GitHub Repo
πΉ Azure Credential Leak Detection β GitHub Repo
πΉ Web-based Markdown-to-LaTeX Converter β GitHub Repo
πΉ Policy Development & GRC Implementation β GitHub Repo
πΉ DevOps & Collaboration Editor β GitHub Repo
πΉ Cybersecurity & Cloud Security β GitHub Repo
βοΈ All projects are designed with a focus on security, automation, academic research, and real-world incident simulation. I continuously update these based on lessons from CTFs, GRC training, and real use cases.
π§ Email: nguy1587@purdue.edu
π LinkedIn Profile
π PicoCTF Profile
π pwn.college Profile
- π΅οΈ SOC Analyst Certification - TCM Security
- π€ Stanford Machine Learning (AI) - Coursera (by Andrew Ng)
- π Google Cybersecurity Professional Certificate
- π Security+ Course (Texas A&M University-Texarkana) - 4.0 GPA
- π CISSP Training (Certified Information Systems Security Professional)
- Programming: C++, Python, JavaScript, Java, Assembly
- Operating Systems: Linux (Advanced command-line usage, system administration, shell scripting)
- Linux Tools: Bash, SSH, Netcat, GDB, Nmap, tshark, tcpdump, ping, nc, shell variables, manage permissions, handle user groups, chain commands, inject and remove custom commands, link and find files, perform file globbing, and pipe commands
- Security: Web Pen-testing, Cryptography, SIEM (Splunk), Wireshark
- Networking: CCNA training, VPN, Firewall, Packet Analysis
- π Bachelor of Science in Cybersecurity β Purdue University's West Lafayette
- π₯ USACO Gold-Level Algorithms (Graph Theory, DP, Greedy, Data Structures)
- π’ Advanced Algorithm Design (Divide & Conquer, Network Flow, Bit Manipulation)
- π Optimized Problem Solving (C++ STL, Fast I/O, Complexity Analysis)