waynekarlo@portfolio ~ zsh

Hi, I'm waynekarlo

Computer Science Student | eJPT Certified | CTF Competitor

Dual-degree CS student across Adamson University (PH) and Minghsin University of Science and Technology (TW). Passionate about reverse engineering, threat detection, and secure system architecture.

// credentials

Professional Credentials & Training

Professional Certifications

INE Security logo
eJPTVERIFIED

eLearnSecurity Junior Penetration Tester

Issued by INE Security

View Credential
INE Security logo
ICCAVERIFIED

INE Certified Cloud Associate

Issued by INE Security

View Credential
Certiport logo
IT SpecialistVERIFIED

IT Specialist - Databases

Issued by Certiport

View Credential

Course Certificates

CNSP icon
CNSP
Certified Network Security Practitioner
Google Cybersecurity icon
Google Cybersecurity
Google Career Certificate
Google Cloud Cybersecurity icon
Google Cloud Cybersecurity
Google Cloud Certificate

// competitions

CTF Competitions

Notable capture-the-flag engagements and results

13th I.T. Skills Olympics event photo
Event #01
2nd Runner Up

13th I.T. Skills Olympics

University of Makati

Focus Areas

Network & Web ExploitationKali LinuxMetasploitNmap

Summary

Exploited vulnerable Windows 7 machines and acquired root flags.

Hack The Beat CTF event photo
Event #02
4th Place (Team), 2nd Best Individual Scorer

Hack The Beat CTF

JISSA

Focus Areas

Reverse EngineeringCryptographyPythonBash

Summary

Analyzed audio files and reverse-engineered code to extract essential flags.

// skills

Proficient & Learning

Category
Proficient
Learning
Languages
.NET C#PythonSQL
CC++
Operating Systems
WindowsLinuxKali Linux
Cloud & DevOps
GitDockerProxmoxAWSGCPAzure
Security & Pentesting
MetasploitNmap
WiresharkBurp Suite
Reverse Engineering
GhidraAssembly
SampleProficient
SampleLearning

// current_focus

Active Development

What I'm currently working on and learning

~/learning/active

Active Learning: C

LEARNING

Currently deep-diving into C to master manual memory management, pointers, etc. Serves as foundations for reverse engineering and exploit development.

Tech Stack

CGCCLinux
View Repository
~/projects/active

Active Project: HoneyClaw Framework

IN PROGRESS

Architecting an isolated, multi-OS Proxmox honeypot network to simulate APT-style attack chains. Engineering the telemetry pipeline to ingest network, kernel, and event logs into an AI-driven SIEM (OpenClaw) to benchmark automated threat correlation for SOC analysts.

Tech Stack

ProxmoxOpenClaw AILog NormalizationNetwork Security
View Source

// experience

Professional Experience

Philippine Food Bank Foundation Inc. logo

Quality Assurance Intern

Philippine Food Bank Foundation Inc.

May 2025 - Sep 2025

Engineered and automated proof-of-concept unit tests utilizing Shipwright as the primary testing framework. Accelerated QA workflows and test creation by leveraging Cursor IDE for AI-driven development. Authored comprehensive documentation to standardize testing workflows and integrate security practices into the pipeline.

Tech Stack

Cursor IDEShipwrightQA AutomationUnit Testing