Exploring, breaking, and securing — from code to networks.
I’m a hobbyist developer and vulnerability analyst with a passion for Linux, Python, and network security. My work blends curiosity with a security‑first mindset — exploring software from both the builder’s and breaker’s perspective to better understand and strengthen systems.
I’m not here to chase trends; I’m here to learn, experiment, and share what I discover along the way.
- Vulnerability analysis and security research
- Linux system customization and optimization
- Python scripting for automation and security tooling
- Network security and protocol analysis
- Open‑source collaboration and knowledge sharing
- Building small, security‑oriented tools in Python
- Experimenting with Linux configurations for performance and security
- Studying network traffic patterns and intrusion detection techniques
Security isn’t just about finding flaws — it’s about understanding systems deeply enough to make them stronger. I believe in continuous learning, responsible disclosure, and contributing back to the community that makes open‑source possible.
If you share my interests or have ideas worth exploring, feel free to open an issue, start a discussion, or collaborate on a project.
My public PGP key is available in this repository:
public key kryptokat@evilbitlabs.io
You can import and verify the public key with GnuPG. Example commands for PowerShell / Windows:
# Import the key into your keyring
gpg --import .\publickey.kryptokat@evilbitlabs.io-eadec6acbe5bacae54c8613b110bf507b364e3c7.asc
# Show the key and its fingerprint directly from the file (no import required)
gpg --show-keys --with-fingerprint .\publickey.kryptokat@evilbitlabs.io-eadec6acbe5bacae54c8613b110bf507b364e3c7.asc
# Or, after importing, list keys with fingerprints
gpg --with-fingerprint --list-keys