_____       
    |  _  |      
 ___| |/' |_   __
/ __|  /| \ \ / /
\__ \ |_/ /\ V / 
|___/\___/  \_/  
                 
                
            
Amateur Red Teamer | Cybersecurity Student | Amateur Threat Researcher
┌─[ HOME ] └─╼ Executing introduction.sh...

[+] Name: Michael Miller

[+] Role: Cybersecurity Student

[+] Specialization: Penetration Testing | Security Analysis | Threat Intelligence


>> About

Second-year Cybersecurity student at Moorpark College focused on proactive threat hunting and penetration testing. I like simulating real world attack scenarios to expose infrastructure weaknesses and implement defensive measures before threat actors find them first.


[+] Status: LOOKING FOR OPPORTUNITIES

┌─[ CONTACT CHANNELS ]

├─> Email: pdxl5555@gmail.com

├─> GitHub: my Github

└─> LinkedIn: my LinkedIn

┌─[ SKILLS ] └─╼ Executing skills.sh...

// SECURITY TOOLS

[+] Metasploit [+] Burp Suite [+] Nmap [+] Wireshark
[+] Nessus [+] SQLmap [+] John the Ripper [+] GoBuster
[+] Hashcat [+] Aircrack-ng [+] Ghidra [+] Nikto

// PROGRAMMING LANGUAGES

[+] Python [+] Bash/Shell [+] JavaScript [+] PostgreSQL
[+] PowerShell [+] SQL [+] HTML + CSS

// SPECIALIZATIONS

[√] Vulnerability Assessment & Management

[√] Incident Response & Forensics

[√] Threat Intelligence & Analysis

[√] Security Information & Event Management (SIEM)

[√] Red Team Operations

[√] Blue Team Defense

[√] Social Engineering

┌─[ PROJECTS ] └─╼ Executing projects.sh...
┌─[ SSH/Telnet Hybrid Cloud Honeypot ]

Cloud Hybrid SSH/Telnet Honeypot With Discord Webhook Encrichment

[+] Tech Stack: ELK Stack, Docker, Bash, Python3

┌─[ Wireless Pentesting Suite ]

fully portable Wi-Fi penetration-testing toolkit on a Raspberry Pi 4B, enabling passive WPA/WPA2 handshake capture and active network-level attacks, including rogue AP setups, evil twin impersonation, and automated deauth attack modules.

[+] Tech Stack: Raspberry Pi, Aircrack-ng suite, Wireshark

┌─[ Darknet Threat Intelligence Research ]

Comprehensive research and analysis of threat actor operations, vulnerability marketplaces, and emerging attack vectors in anonymized networks.

[+] Tech Stack: Tor, OSINT Tools, Python, Data Analysis

[!] Status: CONFIDENTIAL

[i] This project contains sensitive research details available to employers and authorized personnel only.

📧 Request Access - Contact for Details
┌─[ CERTIFICATIONS & BADGES ] └─╼ Executing credentials.sh...
╔════════════════════════╗

CompTIA Security+ (Currently Studying For, Planned testing date: Early 2026)

Security+ Certification

Issuer: CompTIA

Date: N/A

ID: N/A

╔════════════════════════╗

eJPT (Currently Studying For, Planned testing date: December 2025)

eLearnSecurity Junior Penetration Tester

Issuer: eLearnSecurity

Date: N/A

ID: N/A

// ACHIEVEMENTS

 _____
|     |
| HTB |
|_____|
                                    

HackTheBox Script Kiddie

 _____
|     |
| CTF |
|_____|
                                    

NCL Individual Game Top 500 (Fall 2025)

 _____
|     |
| CTF |
|_____|
                                    

NCL Team Game Top 60 (Fall 2025)