OSINT Analyst | CTF Player | Bug Hunter
"Turning raw data into actionable intelligence."
Based in Paris, France π«π·
Passionate about Open Source Intelligence (OSINT) and Digital Forensics. I specialize in connecting dots between scattered data points to build comprehensive reports. Currently focusing on automation of investigative workflows and geolocation challenges.
- Languages: π«π· Native | π¬π§ English (C1/C2) | π©πͺ German (Native) | π·πΊ Russian (B1)
- Key Interests: Geopolitics (Post-Soviet Space), Network Infrastructure, Bug Bounty.
| Category | Tools & Skills |
|---|---|
| OSINT Core | |
| Tech Stack | |
| Security | Burp Suite Wireshark Shodan Maltego Epieos |
| OpSec | VM Management, VPN/Tor routing, Sock Puppets creation |
- 0d.lv Toolkit : Personal investigation platform & CTF toolkit.
-
Exposing a Travel Ad: Russia or New Zealand?
- Methodology: IMINT, Reverse Image Search, Shadow Analysis.
- Outcome: Debunked a misleading ad by geolocating a landscape to Kamchatka.
-
Grain of Truth: Pinpointing a Location
- Methodology: Extreme GEOINT, Infrastructure analysis (Utility poles).
- Medileak 2 β Full Investigation (Healthcare Data Leak Simulation)
- Bleuet de France V4 (Historical & Archival Intelligence)
Recent highlights from competitive hacking.
| Date | Operation / Event | Rank / Result | Team |
|---|---|---|---|
| 2025-12 | TRACS | π Top 10 (~6th) | Phreaks 2600 |
| 2025-05 | HackOSINT 2025 | π 8th Place | Tiens Tiens Tiens 2600 |
| 2025-05 | Medileak 2 | β 100% Solved | Tiens Tiens Tiens 2600 |
| 2025-04 | PwnMe Junior | βοΈ Challmaker | Staff |
| 2024-11 | Objectif: EAGLE | π― All Solved | - |
- CWES (Certified Web Exploitation Specialist) β HTB Academy
- CRTA (Certified Red Team Analyst) β CyberWarfare Labs
- Space Law for New Space Actors β United Nations (UNOOSA)
- OSINT Certification β Basel Institute on Governance