max@kali:~
max ~ $ whoami

Security Researcher | Full Stack Developer | CTF Player

max ~ $ cat about.txt

Pentester with hands-on experience in web application security, vulnerability assessment, and exploit development. Strong defender mindset from SOC/EDR operations. Active on TryHackMe and HackTheBox.

max ~ $ ls skills/
Web App PentestingOWASP Top 10Vulnerability AssessmentExploit DevelopmentSOC OperationsEDR/XDRPowerShellPythonBashFull-Stack DevelopmentMEAN stack
Max Jensen

Hi, I'm Max Jensen

Security Researcher & Full Stack Developer

Crafting secure digital experiences while breaking into systems legally. Passionate about offensive security and building robust applications.

// about_me

Who I Am

A passionate security researcher and full-stack developer with expertise in breaking and building secure systems.

IT Security

Offensive security & pentesting

Full Stack Dev

Modern web applications

Red Team

Attack simulation & assessment

Cryptography

Secure implementations

Security

Penetration TestingRed Team OperationsVulnerability AssessmentExploit DevelopmentWeb App SecurityNetwork SecuritySOC/EDR OperationsReverse EngineeringMalware AnalysisOSINT

Frontend

ReactTypeScriptNext.jsTailwind CSSHTML5/CSS3JavaScript

Backend

MEAN StackREST APIsPowerShellBashPythonNode.jsC#SQL databases

Tools

Burp SuiteMetasploitCobalt StrikeBloodHoundHashcatPowerShell EmpireWiresharkNmapIDA ProGDBDockerGit
// ctf_progress

CTF Journey

Actively hacking on HackTheBox and TryHackMe. Here's my progress in the offensive security community.

27+
Machines Owned
155+
CTF Flags
200+
Challenges
44
Day Streak

HackTheBox

@R3verse

Rank
Noob
Season
Season 9
Joined
Mar 2019
Tier
Free
Open Beta Season active

TryHackMe

@R3versedk

Rank
top 3%
Badges
27
Streak
44
Completed rooms
155
[0xA][WIZARD] - Premium User
// security_feed

Latest Threats

Real-time security news, advisories, and research from leading cybersecurity sources.

Live RSS Feeds • Auto-refresh every 5 minutes

Security News

CVEs & Advisories

Research & Analysis

Key Takeaway

Stay proactive by monitoring these feeds regularly. Subscribe to security advisories for critical software in your environment and prioritize patching based on CVSS scores and active exploitation status.

// projects

My Work

A collection of security research projects, tools, and full-stack applications I've built and contributed to.

⭐ FEATURED

Autonomous SecOps Platform

AI-Powered Threat Detection & Response

Security operations platform using AI/ML to detect and block 29+ attack types with autonomous decision-making. Features self-learning threat intelligence, adaptive defense mechanisms, and predictive security - engineered for cost-efficiency at $1.50/month.

Next.js 15TypeScriptAI/MLOpenAI GPT-4 & OllamaVercel Edge
...
Threats Analyzed
...
Autonomous
...ms
Avg Response
...
Attack Types

🚀 Advanced CapabilitiesLatest

🔗
Attack Chain
Multi-Stage Detection
⚠️
Predictive AI
ML Risk Scoring
🔧
Self-Healing
Autonomous Repair
🧠
Continuous Learning
Adaptive Cycles

Security Analytics Dashboard

Top Attack Types (MITRE ATT&CK)
Attack Types Distribution (Real-time from KV database)
7-Day Attack Trends
Attack Trends
📊 Monthly Overview (Aggregated)
...
Threats
...
Blocked
...
Countries
🌍 Top Threat Origins (Historical):
Loading...
💡 Engineering Highlights
Edge Computing: Sub-50ms response via Vercel Edge Runtime
Production ML: Neural Network (<10ms) + Q-Learning + KV Caching
Hybrid AI: NN + GPT-4o + Ollama with intelligent routing
MITRE ATT&CK: Real-time attack classification & mapping
Dual-Layer Protection: Edge firewall + database with smart sync
KV Architecture: 100% serverless with global replication
Auto-Learning: Continuous improvement from every attack
High Autonomy: Intelligent human-in-loop for critical decisions
Dual-Layer Protection: Edge-level blocking with persistent enforcement
// blog

Latest Articles

Writing about security research, development best practices, and lessons learned from CTF challenges.

// reading

My Reading Journey

Books that have shaped my understanding of security, development, and personal growth.

Currently Reading

Practical Malware Analysis
security

Practical Malware Analysis

by Michael Sikorski

Completed

The Shellcoder's Handbook
security

The Shellcoder's Handbook

by Chris Anley, John Heasman, Felix Lindner, Gerardo Richarte

Hacking Exposed 7
security

Hacking Exposed 7

by Stuart McClure, Joel Scambray, George Kurtz

A Bug Hunter's Diary
security

A Bug Hunter's Diary

by Tobias Klein

Reversing: Secrets of Reverse Engineering
security

Reversing: Secrets of Reverse Engineering

by Eldad Eilam

Penetration Testing: A Hands-On Introduction to Hacking
security

Penetration Testing: A Hands-On Introduction to Hacking

by Georgia Weidman

The Art of Intrusion
security

The Art of Intrusion

by Kevin Mitnick

Hacking Exposed Linux, 3rd Edition
security

Hacking Exposed Linux, 3rd Edition

by ISECOM

Ghost in the Wires
personal-growth

Ghost in the Wires

by Cal Newport

Google Hacking for Penetration Testers
security

Google Hacking for Penetration Testers

by Bill Gardner

Recommended Reads

Secrets and Lies
security

Secrets and Lies

by Bruce Schneier

The Web Application Hacker's Handbook
security

The Web Application Hacker's Handbook

by Dafydd Stuttard & Marcus Pinto

// testimonials

What People Say

Recommendations from colleagues, managers, and collaborators I've had the pleasure of working with.

"Jeg har haft fornøjelsen af Max som supporter i Cloud People og kan give ham mine bedste anbefalinger. Max er gået til opgaverne med stort engagement og lyst til at lære nyt, og han har været hurtig til at finde sin plads i teamet. Max har fået løst de givne opgaver på bedste vis, og kundernes tilfredshed er helt sikkert et bevis på, at han har potentiale til meget mere end 1. line support."

Flemming Agner Jørgensen
Flemming Agner Jørgensen
IT Support Coordinator at Cloud People A/S
September 2017
// contact

Get In Touch

Have a security project in mind, interested in collaboration, or just want to chat? Reach out through any of these channels.

contact_info.sh
$ cat location.txt
Denmark, EU
$ cat availability.txt
Open for: Security Consulting, Pentesting, Full Stack Projects
$ cat response_time.txt
Usually within 24-48 hours

Prefer the fastest response? LinkedIn is the best way to reach me.