Breaking and building since my early teens (web security, network exploration). Career path took me through finance, compliance and business management — four years in regulated finance (wealth management, LCB-FT compliance, business management). Full-time back on technical security work since late 2025 — active CTF practice, building open-source investigative tools, deepening methodology. Now with a thorough understanding of financial flows, risk and regulatory frameworks.
Working on
· sec-notes
· usertrail
· sanctioncheck
· corprecon
Focus · OSINT · Financial Investigation · Threat Intelligence
Core Tools · Python · Linux · Maltego · Shodan · Spiderfoot · Recon-ng · Sherlock · Wireshark
Learning · Splunk · Malware analysis
Certifications · Trace Labs OSINT Educational Series · F1NDX OSINT Levels 1-3 · EBIOS Risk Manager — introduction (ANSSI, 2026)
CTF rankings (active since late 2025)
- Osintopia
- OSINT Industries CTF — Rank 19 / 2300
- CTF Bleuet de France V5 (AEGE, mai 2026) — 100% · solo · 36eme/220 équipes
- Trace Labs Search Party CTF - En cours
- Root-Me · TryHackMe · HackTheBox
Contact · Available on request
OSINT investigation starts with a clear methodology before touching any tool. I follow a structured collection → validation → enrichment workflow, document everything in Obsidian, and publish writeups on sec-notes.
Financial background feeds directly into FININT work: reading corporate structures, tracing beneficial ownership, cross-referencing sanctions lists — things I did professionally for four years under LCB-FT compliance.
Designed by @twux-sec.



