[ OPEN SOURCE INTELLIGENCE · FULL PROFILE ENUMERATION ]
RENÇBER AKMAN
Security Researcher  ·  Backend Engineer  ·  Perpetual Student
terminal — target: RENCBERAKMAN
SCROLL
[PHASE 01]
TARGET IDENTIFICATION
osint --target RENCBERAKMAN --output full
// SUBJECT
Name      Rençber Akman
Location   Turkey 🇹🇷 · UTC+3
University Akdeniz University
Dept.      Computer Programming
// THREAT VECTOR
Entry     SOC Analyst
Target    Red Team Operator
Domain 1 Offensive Security
Domain 2 Backend Architecture
Posture   Escalating — by design
// CURRENTLY LEARNING
↳ Network protocols, packet by packet
↳ Microservice architecture patterns
↳ Offensive security fundamentals
↳ Thinking like an adversary
// CERT OBJECTIVES
☐ CompTIA Security+
☐ CompTIA CySA+
☐ CEH
☐ OSCP ← primary target
"I do not just write code — I interrogate it.
I do not just use systems — I dissect them.
I do not just learn — I rebuild from first principles.
The distance between a developer and a security researcher is not skill.
It is the willingness to ask: what happens when this breaks?"
— RENCBERAKMAN // core_belief.conf
[PHASE 02]
TECHNICAL ENUMERATION
enum4linux -a RENCBERAKMAN
LANGUAGES
PHP
PROFICIENT
Web dev, REST APIs, Google Books & Gemini API integration
Python
INTERMEDIATE
Automation, scripting, security tooling, active development
C# / .NET 9
INTERMEDIATE
Clean Architecture, Entity Framework, Web API, encryption
SQL
INTERMEDIATE
Schema design, complex queries, SQL Server, SQLite, MySQL
BACKEND & TOOLS
.NET 9Clean ArchitectureEntity Framework MicroservicesREST APIDocker GitLinuxMySQLPostgreSQL
SECURITY KNOWLEDGE
Kali Linux
ACTIVE USE
Nmap
ACTIVE USE
Burp Suite
LEARNING
Wireshark
LEARNING
Metasploit
LEARNING
SIEM / SOC
STUDYING
OWASP Top 10
STUDYING
Web Pentesting
STUDYING
PLATFORMS
TryHackMeHackTheBox PortSwigger LabsOWASP WebGoat
[PHASE 03]
CAREER TRAJECTORY
systemctl status career.service --no-pager
NOW
Foundation
ACTIVE
Student at Akdeniz University. Building mastery in PHP, Python, C# and security tooling simultaneously. Every system studied from two angles — the builder's and the adversary's.
PHPPythonC# .NET 9LinuxKaliNmap
NEAR
Phase I — SOC Analyst
PLANNED
Entry point into professional security. SIEM, threat detection, incident response, log analysis. Defenders who have never attacked are blind to half the picture — but the foundation starts here.
SIEMThreat DetectionIncident ResponseSecurity+CySA+
MID
Phase II — Red Team Operator
LOCKED
Primary destination. Adversary simulation, penetration testing, exploit development. The best way to protect a system is to attack it first — ethically and methodically.
OSCPCEHExploit DevAdversary SimPost-Exploitation
LONG
Convergence — Security Architect
LOCKED
Where the builder and the breaker become one. Security not patched on after deployment — woven into the architecture from line one. DevSecOps, zero trust, threat modeling at design phase.
DevSecOpsZero TrustThreat ModelingOSED
[PHASE 04]
BEHAVIORAL ANALYSIS
cat /proc/mindset | grep CORE
"Every system is a set of assumptions made concrete in code.
Security begins exactly where those assumptions end.
I do not stop at 'it works.'
I ask: why? Under what conditions does it not?
Who designed these conditions? What did they assume I wouldn't do?"
RENCBERAKMAN // mindset.core_belief_01
01
// ATTACK SURFACE
A developer who has never thought like an attacker is building on sand and calling it bedrock. Offense and defense are two perspectives on the same architecture — you need both.
02
// ON VULNERABILITY
The most dangerous vulnerabilities are not in the code. They are in the assumptions the coder never questioned. A system is only as secure as the imagination of its designer.
03
// ON LEARNING
Every failed challenge teaches more than every solved one. Premature confidence is the real enemy. I catalogue my own knowledge gaps before someone else exploits them.
04
// ON ARCHITECTURE
Performance and security are not trade-offs. They are architecture problems, solved before line one is written — not patches applied when something burns in production at 3AM.
05
// FIRST PRINCIPLES
Black boxes are just vulnerabilities you haven't found yet. I refuse to trust a system I cannot trace from the ground up. Pattern-matching is a crutch — understanding is the weapon.
06
// INVARIANT
Curiosity — the one process that will never terminate. The machine does not forgive ignorance. So I make ignorance my primary target and attack it relentlessly.
[PHASE 05]
ACTIVE OPERATIONS
ls -la /projects --recursive --status
SECRET MANAGEMENT API
VaultGuard
Enterprise-grade secret management API with a Zero-Knowledge approach. Passwords, API keys and sensitive data are encrypted with AES-256 before being stored — the server never sees plaintext. Built on Clean Architecture for maximum maintainability and testability.
  • AES-256 encryption + BCrypt hashing — Zero-Knowledge design
  • Clean Architecture — Domain / Application / Infrastructure / WebAPI
  • Audit logging on every access and modification
  • SQL Server (prod) · SQLite (testing)
C# 13 .NET 9 Clean Architecture AES-256 SQL Server REST API
github.com/RENCBERAKMAN IN PROGRESS
AI-POWERED BOOK ANALYSIS
Kitap Analiz
PHP web application that combines the Google Books API for book discovery and the Gemini AI API for deep textual analysis. Users can search, retrieve and receive AI-generated insights on any book — completed end-to-end.
  • Google Books API integration for metadata & search
  • Gemini AI API for AI-powered analysis & summaries
  • Custom cURL-based HTTP client layer in PHP
  • MySQL database for user data & history
PHP MySQL Google Books API Gemini AI cURL
github.com/RENCBERAKMAN COMPLETED
RACING SIMULATION — UNREAL ENGINE
Racing Sim
Full racing simulation being built in Unreal Engine with C++. Learning systems-level programming through real physics simulation, procedural world generation and complex vehicle dynamics including drift bot AI logic.
  • Rigid body physics — suspension, tire friction, weight transfer
  • Drift bot AI — oversteer control logic in C++
  • Procedural world & track generation
  • Vehicle movement system built from scratch
C++ Unreal Engine Physics Engine AI / Bot Logic
github.com/RENCBERAKMAN ACTIVE
[PHASE 06]
ESTABLISH CONNECTION
nc -zv rencberakman.com 443 — port open
// EXECUTIVE SUMMARY
This target approaches every system as both a builder and a potential adversary. Not a passive learner — an active dissector. Threat level: escalating.
// RECOMMENDATION
Collaborate. Do not underestimate. Will become significantly more capable over time. Threat posture: escalating — by design.
// SESSION STATUS
[ACK] Packet received. Response latency: human.