dan@dannarita
dan@dannarita.es:~
 ____              _   _            _ _        
|  _ \  __ _ _ __ | \ | | __ _ _ __(_) |_ __ _ 
| | | |/ _` | '_ \|  \| |/ _` | '__| | __/ _` |
| |_| | (_| | | | | |\  | (_| | |  | | || (_| |
|____/ \__,_|_| |_|_| \_|\__,_|_|  |_|\__\__,_|
                        

Type help to see available commands, or click any item in the sidebar.

๐Ÿ’ก This is a real terminal. Try typing Linux commands... you might find some surprises.

$ blog --list

$ cat about.txt

๐Ÿ‘จโ€๐Ÿ’ป About Me

  • ๐ŸŽ“ Cybersecurity Engineering student at Universidad Rey Juan Carlos (URJC) โ€” Madrid, Spain
  • ๐Ÿ” Focused on Offensive Security, Penetration Testing, and AI in Cybersecurity
  • ๐Ÿง  Interested in automating exploitation and developing autonomous security tools using Machine Learning and LLMs
  • ๐ŸŽฏ Currently looking for internships to grow professionally and sharpen my skills in the field
  • ๐Ÿ’ฌ What I want you to see here: potential, consistency, and a strong offensive security mindset

๐ŸŽ“ Education

  • ๐Ÿ“ Grado en Ingenierรญa de la Ciberseguridad โ€” Universidad Rey Juan Carlos (URJC), Madrid
  • ๐Ÿ“… Currently enrolled โ€” expected graduation 2027
  • ๐Ÿ“š Coursework: Network Security, Cryptography, Secure Software Development, Operating Systems, Database Security

๐Ÿ›ก๏ธ Security Interests

  • โš”๏ธ Offensive Pentesting (Red Teaming, Network Exploitation, Zero-Touch Automation)
  • ๐Ÿค– AI applied to Cybersecurity (LLMs for exploitation paths, ML for false-positive reduction)
  • ๐ŸŒ Web application security & Vuln Dev (OWASP Top 10, API exploitation, Custom Payloads)
  • ๐Ÿ—๏ธ Building security orchestration tools, Automated RAG Memory systems, and Agentic Pipelines

๐Ÿš€ Featured Achievement

  • ๐Ÿ•ท๏ธ Developed an Agentic Autonomous Penetration Testing Orchestrator using LLMs and Machine Learning
  • ๐Ÿง  Implemented a dynamic Knowledge Graph to map networks and an OPEU loop for automated exploitation and pivoting
  • ๐Ÿงฉ Integrated multiple tools (Metasploit, Nmap, Nuclei) via the Model Context Protocol (MCP)

$ neofetch

dan@dannarita.es โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ” OS: Cybersecurity Engineering @ URJC Host: Madrid, Spain Kernel: Offensive Security / Pentesting Uptime: University Student — est. 2027 Shell: Python, Java, JavaScript, C, Bash DE: VS Code / Kali Linux Terminal WM: LLMs / Agentic Orchestration Theme: Security-First [Offensive] Terminal: dannarita.es CPU: Motivated & Consistent GPU: Creative Problem Solver Memory: Always Learning — Never Enough โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”

$ man help

Command Description
about Who am I โ€” bio, studies, and links
neofetch System info โ€” but make it personal
projects Browse my featured projects
skills Languages, tools, and what I'm learning
experience My journey timeline
ctfs CTF experience and hands-on learning
contact How to reach me
stats Live GitHub statistics
cv Request my CV (sent by email)
theme Change the terminal accent color
sound on/off Toggle keyboard sound effects
clear Clear the screen
quit Return to the welcome screen

๐Ÿ•ต๏ธ Secret commands โ€” This terminal hides some easter eggs. Here are some hints:

  • Try running some classic Linux commands like whoami, ls, or pwd
  • What happens if you try to break things? ๐Ÿ’€
  • Ever seen The Matrix? ๐ŸŸข
  • Do cows have opinions? Ask cowsay
  • Check your command history

$ ls ~/projects

$ cat skills.json

๐Ÿงฐ Languages & Tools

C Java Python JavaScript HTML5 CSS3 MySQL Bash / Linux LLMs / Agents Machine Learning Metasploit Nmap / Nuclei Streamlit Docker

๐Ÿ“Œ Proficiency

Linux & Bash
Strong
Backend Java
Strong
Python & Scripting
Strong
Pentesting & Exploitation
Strong
LLMs & Agentic orchestration
Strong
Web App Security (OWASP)
Strong
Machine Learning (Sklearn/XGBoost)
Growing
Docker
Learning
Git
Learning
Cloud / IAM
Interested

$ curl -s http://localhost/api/experience

$ cat ctf_log.txt

๐Ÿงช CTFs & Hands-On Learning

  • ๐Ÿ Participated in multiple CTFs, including events organized at URJC
  • ๐Ÿ”ง I enjoy applying concepts in practice: recon โ†’ exploitation mindset โ†’ mitigation & defense
  • ๐Ÿง  Focused on learning real-world offensive techniques to better understand how to defend against them
  • ๐Ÿ”„ Constantly translating CTF lessons into secure development practices

$ achievements --list

$ cat contact.md

๐Ÿ“ซ The best way to reach me is through my socials:

$ github --stats

โณ Type stats or click the sidebar to load live GitHub data.

$ sudo set-theme

Select an accent color for the terminal. Your choice is saved automatically.

$ ./snake.sh

SCORE: 0 HI-SCORE: 0

Use Arrow Keys or WASD to move.

# pc-info --dashboard

Last update: --:--:--
๐Ÿง 
CPU Usage
--%
๐Ÿ“Š
RAM Usage
--%
๐ŸŽฎ
GPU Load
--%
๐Ÿ’ฌ
AI Tokens Given
--

โšก Power Consumption Distribution

๐Ÿ’พ VRAM Utilization (MB)

-- MB / -- MB

๐Ÿ–ฅ๏ธ Hardware Status

GPU: --
Cores: --
RAM: -- GB
Total Watts: -- W

# visitor --stats

# cv-requests --list

Cargando solicitudes...

# email-logs --tail

Cargando logs...

$ chat --ai

๐Ÿค– AI: Hello! I'm Dan's personal AI assistant. How can I help you today?
โฏ
0/300