)
) ( ( ) ( /(
( /( ))\))( ( /( )\()) ( ( ( ( (
)\())( /((_)()\ )\()|(_)\ )( )\ )\))()\ (
((_)\ )\()|()((_|(_)\ ((_)(()((_|(_))((_) )\ )
/ (_|(_)\ | __|__ / / _ \ ((_|_)(()(_|_)_(_/(
| () |\ \ / |__ \ / / | (_) | '_| / _` || | ' \))
\__/ /_\_\ |___//_/ \___/|_| |_\__, ||_|_||_|
|___/ Cybersecurity student interested in CTFs and security tooling. Currently learning through hands-on projects and coursework. Master’s student in Cybersecurity
- Reverse engineering fundamentals (Ghidra)
- Building beginner-friendly CTF challenges
- Introductory malware analysis in lab environments
- Learning low-level networking concepts
- Writing small security tools in Nim, C, and C++
-
NimPacket A learning-focused packet manipulation library for Nim that works with Ethernet, IPv4, TCP, UDP, and ICMP.
-
Flag_Hunt A small collection of beginner reverse engineering challenges designed to practice basic Ghidra workflows.
-
RE_VAULT Personal repository for reverse engineering exercises, experiments, and notes.
-
PenTest-WriteUps Notes and write-ups documenting labs, CTFs, and cybersecurity learning progress.
- Website: https://0x57origin.vercel.app/
- Dev.to: https://dev.to/0x57origin
- Nim Forum: https://forum.nim-lang.org/profile/0x57Origin
- NimPacket Site: https://nim-packet-website.vercel.app/
- LinkedIn: https://www.linkedin.com/in/mohammad-nazmul-82012127b/
- Pull Shark – Opened and merged pull requests
- Regular commits across learning projects and experiments
Still learning, still experimenting, and documenting progress as I go.

