$

Cybersecurity · Offensive & Defensive · Building and breaking systems

> lab: homelab online · 47d uptime

// what I've built

Projects

DeadLink

private

Custom C2 framework built from scratch in Rust: native GUI, TLS 1.3, live agent map.

  • Purpose-built binary protocol + AES-256-GCM encryption
  • Live geolocation map with real-time agent tracking
  • Plugin architecture + built-in agent compiler
RustC2Offensive Security
// private repo — code available on request

Red Phantom

private

Penetration testing suite unifying 35+ tools and 18 custom scripts under one interface.

  • Plugin architecture: drop a .py file, zero core changes
  • AI-powered CVE lookup and attack path generation
  • One-click PDF reporting with severity dashboards
PythonPentestRed Team
// private repo — code available on request

NetTrap

Desktop honeypot monitor capturing SSH and HTTP attacks with live visualization.

PythonHoneypotBlue Team

CyberBase

live

Full-stack cybersecurity learning platform: 121 commands, attack flows, quizzes, log analyzer.

  • 7 attack flows with attacker/defender/victim perspectives
  • Rule-based log analyzer with JSON API
  • Bilingual (EN/SV) with global search
FlaskFirebaseMongoDBAI

M4K-Pipeline

live

CI/CD pipeline with security scanning, staging/production deploy, and Slack alerts.

GitHub ActionsDockerTrivyTerraform

CyberPass

live

Password security tool with strength analysis, guided creation, and breach checking.

JavaScriptSecurityAPI

// who I am

About

I work at the intersection of cybersecurity and engineering: building security tools, breaking systems to understand them, and automating what can be automated. My focus spans offensive and defensive security, from penetration testing toolkits to honeypot monitoring and CI/CD hardening.

I build fast and I build with intent. Most of my projects go from idea to working tool in days, not months. I use AI as a force multiplier, not to replace understanding, but to move at a pace that would be impossible alone. Everything I ship, I understand. If I can't explain how it works, it's not done.

Before cybersecurity, I spent years in competitive Muay Thai and worked as an esports performance coach, helping players improve through structure, discipline, and honest feedback. Those worlds taught me the same thing: read the situation, stay calm under pressure, and never confuse activity with progress.

Based in Malmö, Sweden. Open to opportunities in cybersecurity, offensive, defensive, or wherever the work demands someone who builds.

Mattej Petrovic

// tools & technologies

Tech Stack

Security Tools

NmapWiresharkTrivy

Infrastructure & DevOps

DockerKubernetesTerraformGitHub ActionsCI/CDLinuxGitUFWFail2ban

AI & Automation

VoiceflowAI AgentsPrompt Engineering

Frameworks & Concepts

MITRE ATT&CKZero TrustLeast Privilege

// background

Education

Sep 2025 – Jun 2027
IT & Cybersecurity Technician
Chas Academy
Nov – Dec 2025
Google Cybersecurity Professional Certificate
Coursera
Sep 2024 – Jul 2025
Game Programmingnot completed
Futuregames
Mar – Jun 2021
Personal Trainer & Nutritional Advisor
IntensivePT
Aug 2017 – Jun 2020
IT Technology
NTI Gymnasiet

// download

CV

Mattej Petrovic — CV
For a detailed overview of my experience and qualifications.
Download CV (PDF)

// get in touch

Contact

DIRECT
PetrovicMattej@outlook.com
Open to opportunities in cybersecurity. Let's talk.
SEND A MESSAGE