console.log (

Hey, I’m Rokibul Roni🤟🏼

I´m a CyberSecurity Specialist.

I will help you comply with the Cyber Security Expert.


About Me

I am a CyberSecurity Specialist. I will help you comply with the Cyber Security Expert. I aim to "Protect Your Business" and "Protect You and Your Family" from Cyber Attacks. I have practical experience with various Cyber Crime Cases like Cryptocurrency Scams, Blackmailing, Device Forensics, Fraud & Scams, and IoT Hacking. My service will investigate your Devices, Scan your Network, and examine your IT system to identify potential threats. And offer a timely response to defend it from any upcoming dangers. I have successfully solved many more Cyber Crime, Security, and Digital Forensics Cases to support business objectives and growth. I assisted as a "Linux Administrator" for MakeMyPrivacy, including Threat & Vulnerability Management, System Monitoring, and Virtual IT Support. Also, I have experience as a "Research And Development Engineer" on CEHExam Network, with knowledge of Data Analysis, Auditing, SaaS, Team Leadership, Teamwork, Operations Research, and Data Security.

My Work

I am a freelancer, I worked for various CyberSecurity companies in the USA dedicated to the defense of CyberWar. Currently, I work for corporate and business-level cyber security.

const aboutMe = {
name:'Rokibul Roni',
title:'Cybersecurity Specialist',
skills: [
'OSINT', 'Footprint', 'Penetration Testing', 'Digital Forensic', 'Malware Analysis', 'Firewalls', 'Network Security'
tools: [
'Metasploit', 'Wireshark', 'NMAP', 'NIKto', 'Maltego', 'Nessus', 'SNORT', 'OllyDBG', 'SpiderFoot', 'Acunetix', 'Intruder', 'John the Ripper', 'Autopsy', 'Burp Suite', 'Netstumbler, Wazuh'
case investigation: [
'Cryptocurrency Case', 'Blackmailing Case', 'Device Forensics Case', 'IoT Hacking Case', 'Fraud & Scam Case'
contact: {
Country:'Bangladesh 🇧🇩'

Recent Post

Linux Security

01/02/2024 - 28 min read

All about Linux Security | A perfect Security of a Linux System can be done by this article

  • #Linux

Complete Guide to Setting up a Samba Server on Linux for Seamless File Sharing

14/06/2023 - 7 min read

How to configure samba server on linux

  • #Linux

Cybersecurity Career Accelerator: Power Up Your Journey to Success

31/05/2023 - 25 min read

A Complete Roadmap to Cybersecurity Career

  • #Cybersecurity

Social Engineering - Complete Roadmap

13/02/2023 - 8 min read

Bug bounty programs have become increasingly popular in recent years as a way for organizations to improve their cybersecurity.

  • #Cybersecurity

WAF Solution: Complete Guide to Choose WAF

13/02/2023 - 34 min read

A Web Application Firewall (WAF) is a security system that monitors, filters or blocks incoming traffic to a web application.

  • #Cybersecurity

Reset Linux OS password from boot/GRUB boot loader

12/02/2023 - 4 min read

Reset Debian and Redhat Based Destro Passwords from GRUB Boot Loader

  • #Linux

Bug Bounty Programs: A Complete Guide

11/02/2023 - 11 min read

Bug bounty programs have become increasingly popular in recent years as a way for organizations to improve their cybersecurity.

  • #Cybersecurity

Linux File Permissions and Ownership Management

09/02/2023 - 9 min read

Linux is a multi-user operating system, which means that multiple users can access the same system and resources.

  • #Linux

Top Linux Distros

07/02/2023 - 2 min read

There is a 600+ Linux distribution available in the market! Let's find out what is best for you.

  • #Linux

Top 10 Virtual Machine Software

03/01/2023 - 2 min read

Most popular virtualization software | We are going to learn about the most popular virtualization software for your Operating System

  • #VM

Linux Introduction

01/01/2023 - 23 min read

Linux is a popular open-source operating system used by millions of people worldwide. Its a details articls about basic linux

  • #Linux

How to Secure Your SSH Server

23/11/2022 - 4 min read

Practical ways to protect your SSH server from unauthorized access

  • #SSH
  • #CyberSec

More Articles


Console Connect

Console Connect - A Secure Chat Server on Powershell Plain text chat using powershell over any network, or local network.

  • Powershell
  • Shell

\ n

IP Identifier

A Social Engineering Web Application to find out targets ISP Information.

Made with PHP, IP Tools, Analytics, Cloudflare.

  • PHP
  • Analytics
  • Cloudflare

\ n

Packet Capture

Monitor and Capture unencrypted data flow.

Made with Shellscript.

  • Bash
  • Shellscript

\ n

Email Spoofing

An Email Spoofing web tools to send any mail from anyhere to anywhere.

Made with PHP, IMAP.

  • PHP
  • IMAP

\ n

Databreach Finder

Search for breaching data over the surf and deepweb

  • Index
  • Bash
  • ShellScript

\ n


A DoS Attack script to decrease bandwidth of any website.

Made with Python.

  • python
  • rdp

\ n

Malware Scanner

Malware Scanner - An web application based on PHP to detect malware, viruses, shells, malicious code, and threats.

  • CVE
  • PHP
  • JavaScript

\ n

Exif Metadata Remover

Remove any image extension meta data using the pyhton script. The script will remove all metadata, including EXIF, IPTC, XMP, and ICC profiles, from the specified image file.

  • Python
  • Shell

\ n


You can learn more about me from my Footprints

Copyright © 2023 | All Right Reserved

Developed by Rokibul Roni