2nd-year Cybersecurity student at Wrocław University of Science and Technology. I build security tools: network monitors, system daemons, shells in C. Currently working an IAM internship at Schaeffler while finishing Lynx, a Linux HIDS daemon I'm writing from scratch.
I study cybersecurity engineering at Wrocław University of Science and Technology. The program covers the usual suspects: network security, OS internals, PKI, forensics, cryptography. It's decent on theory; I try to make up the gap on the practical side.
Most of what I've learned about security came from building things and breaking them in VMs. Writing a Unix shell in C tought me more about process management than any lecture. Same with building a NIDS, I've started caring a lot more about TCP flags.
I daily drive Linux, use QEMU/KVM for lab work, and have a Windows dual-boot for when I need it. My current focus is IAM at Schaeffler during the day and Lynx (my HIDS daemon) in the evenings.
A Linux HIDS daemon that watches the filesystem and running processes in real time.
Live packet capture tool that detects port scans, SYN floods, ICMP sweeps, and DNS queries to known malicious domains. Pulls threat intel from Abuse.ch URLhaus on startup.
A Unix shell written in C. Mostly an exercise in understanding what actually happens when you type a command — fork, exec, wait, and all the plumbing between them.
Bash utility for checking system health at a glance. CPU, memory, disk, network — plus threshold alerts when something looks off.
My personal config files with a Bash deployment manager. Catppuccin Mocha theme across Kitty and Neovim. More time goes into this than I'd like to admit.
Simple CLI password manager in Python. Encrypted storage, key derivation, basic CRUD. Good exercise in applying crypto primitives to something that actually has to work.
I'm looking for junior roles and internships in cybersecurity — SOC, incident response, or security engineering. Also open to collaborating on security tooling or open source projects.