Projects

Hands-on experiments and real-world fixes.

Close-up of a computer motherboard with glowing circuits and cables.
Close-up of a computer motherboard with glowing circuits and cables.
Network Tools

Building scripts to automate network scans.

Screenshot of a terminal window running a custom security script.
Screenshot of a terminal window running a custom security script.
Photo of a cluttered desk with multiple monitors showing code and logs.
Photo of a cluttered desk with multiple monitors showing code and logs.
Diagram illustrating a network penetration testing workflow.
Diagram illustrating a network penetration testing workflow.
Security Tests

Breaking systems to find hidden flaws.

Snapshots

Moments from my cybersecurity journey and gear.

Close-up of a cluttered desk with multiple monitors displaying network traffic and security alerts.
Close-up of a cluttered desk with multiple monitors displaying network traffic and security alerts.
Photo of a vintage server rack with blinking lights in a dimly lit room.
Photo of a vintage server rack with blinking lights in a dimly lit room.
A candid shot of Zoran working late into the night, surrounded by cables and tools.
A candid shot of Zoran working late into the night, surrounded by cables and tools.
Screenshot of a terminal window running a penetration testing script.
Screenshot of a terminal window running a penetration testing script.
An old, dusty network switch with labels peeling off.
An old, dusty network switch with labels peeling off.
A collection of cybersecurity books stacked next to a cup of coffee.
A collection of cybersecurity books stacked next to a cup of coffee.