Hey! I'm Owen (Dobliuw) passionate about technology and a self-taught researcher focused on offensive cybersecurity. I currently work in the Vulnerability Management department at a prestigious company performing pentesting on client systems and custom development APKs, DAST and SAST analysis of these and web systems, and corresponding reporting.
I started in the Blue Team area as a SOC Analyst (Level 1-2) and while I continue to delve deeper into the areas of ethical hacking, exploitation, reverse engineering, low-level development, and networks and security in these areas, electronics, and anything else that interests me to nerd out on (I fell in love with studying).
My driving force? The βWhy behind the whyβ.
- π‘ I study systems from the core to the most superficial application layer.
- π£ I am developing my own tools and hardware devices for RF attacks, Bluetooth, Bad USBs, content disclosure, and tutorials and/or classes on cybersecurity, programming, operating systems, and their configuration at the sysadmin level.
- π§ My interests revolve around understanding everything that others use and understanding and being the one who develops this myself.
- π Ethical Hacking & Red Team
- π₯ Vulnerabilities and Binaries explotation(CVE & PoC crafting)
- πΆ Wireless Hacking (Bluetooth, SDR, NFC, RF)
- π» OS Linux and Windows internals
- π§° Tools: Wireshark, nmap, Burp Suite, Metasploit, Ghidra, IDA Free, +40k more lol.
- π§ Programming: Python, Bash, JavaScript, C and Powershell (Ofcourse can programming in others too)
- π Networks, protocols and packet analysis
- π§± System security & Blue Team (SOC Analyst with knowledge in EDRs, SIEMs and Reporting).
- π Electronics development oriented to Home Labs, custom servers and sysadmin works.
Project | Description | Technology |
---|---|---|
Dobliuw Web Site | My custom WebSite oriented to be a Cyber Wiki and a Portfolio to show to the world who I am... who is Dobliuw. | Frontend: React, Backend: FastAPI and content of wiki: Too much. |
P4sw0rds G3ner4t0r | Script to create custom passwords based in inputs like words to use, length and character alteration techniques. | Python |
Some Hacking tools | Some hackign tools used to perform attacks, scans and more. | Python, Bash and PowerShell |
π Look my github repository to se more utilities in the future. (Also you've my Full Stack Web Developer github too see some others skills and projects).
- πΌ Cybersecurity company.
- π§ Saving $ to certificate eJPTv3, eCPPTv3, eWPTXv3 and OSCP (And ofcourse more).
- βοΈ Expoits development (BoF, format string, heap) and thinking to buy Maldev for Malware development.
- π°οΈ Learning more about hardware world, hacking hardware and the wired and wireless communications.
- π§΅ Creating some custom home labs like my own server or my own hacking tools (Comming soon more information on my Social Networks)
(My main personal goal is create articles for the community in Markdown, so.....)
Click here to see my articles.- βοΈ [email protected]
- π LinkedIn
- π Click here to see more options
βDonβt just learn how tools work β learn why they were built, how and why they fail, and how to build your own real world solutions.β
Att.