SYSTEM READY
user@senura:~$ ACCESS GRANTED

OFFENSIVE MINDSET.
DEFENSIVE STRATEGY.

"Securing the digital frontier, one packet at a time."

ENTER CTF WARZONE
SYSTEM ALERT: A hidden CTF challenge is active. Solve it for a surprise!
Welcome to SenuraOS v1.0
Type 'help' to view available commands.

user@senura:~$

MISSION BRIEF

I'm Senura De Silva, a 21-year-old cybersecurity enthusiast and second-year student at NIBM, specializing in Network Engineering and Ethical Hacking. My journey began with a deep curiosity about how systems communicate—and how they can be exploited or defended.

I'm passionate about exploring both offensive and defensive security—from penetration testing and network hardening to incident response. I believe that to build secure systems, one must first learn how to break them.

Beyond academics, I'm an active CTF player, pushing myself to discover new vulnerabilities. When I'm not buried in code, I love designing clean, minimal UIs—merging technology, security, and creativity.

TARGET: SENURA.D STATUS: ONLINE
Colombo, Sri Lanka

SKILL ARSENAL

Scroll to deploy toolset

Network Security

VLANs, VPNs, IDS/IPS, Squid Proxy

Ethical Hacking

Penetration Testing, Red Teaming

Linux Ops

CentOS, Bash Scripting, System Hardening

Certified

CEH v13 (Theory), RHCSA

Scripting

Python, Automation, Tool Dev

Hardware

Arduino, ESP32, IoT Security

Data/Web

MySQL, Web App Security, Log Analysis

OPERATIONAL LOGS

Phishing Simulation

A complete ethical phishing campaign executed within a controlled lab. Included campaign planning, payload-free landing pages, and credential-harvesting simulations.

Social EngineeringReportingThreat Analysis

Enterprise Network

A fully functional medium-scale company network designed with real enterprise-grade routers and firewalls. Features VLAN segmentation, routing, VPN, and centralized monitoring.

CiscoVLANVPNIDS/IPS

Malware Analysis Lab

Dedicated environment for static and dynamic analysis of malicious software. Configured with isolated VMs and sandboxing tools to study malware behavior and IOC extraction.

VirtualizationSandboxingReverse Engineering

Multi-OS Org System

Integrated IT infrastructure combining Windows AD and Linux DNS/DHCP services. Demonstrates cross-platform authentication, automation, and secure service integration.

Active DirectoryLinuxAutomation

CREDENTIALS

CEH v13

Exam Completed

CEH v13 Practical

In Progress

RHCSA

In Progress