$ whoami
Computer Systems Engineering student at UDLAP with expertise in cybersecurity, software development, and AI. President of Hackztecs cybersecurity organization and experienced in CTF competitions.
I'm PocketNugget, a Computer Systems Engineering student at Universidad de las Americas Puebla (UDLAP) with a passion for cybersecurity and software development. As President of Hackztecs cybersecurity organization, I lead teams in Capture the Flag competitions and security research.
My expertise spans across cybersecurity, AI, software engineering, and infrastructure development. I've participated in multiple CTF events, developed innovative applications, and contributed to security research published by Springer.
Bachelor's Degree in Computer Systems Engineering | Expected May 2026
Puebla, Mexico
Microservices with Node.js and React | Udemy | January 2025
JavaScript, Node.js, React, Docker, Kubernetes
Prototype Design | UPAEP | July 2021
Concurrent Engineering, Project Lifecycle Management, Engineering Analysis, CAD
President | January 2024 - Present
Puebla, Mexico
Treasurer | August 2024 - Present
Puebla, Mexico
Treasurer | August 2024 - Present
Puebla, Mexico
Infrastructure Engineer | August 2024 - Present
Puebla, Mexico
TBSeK | April 2025 - Present
Puebla, Mexico
T-Systems | April 2024 - July 2024
Puebla, Mexico
Springer | October 2024
"Easy for Us, Complex for AI: Assessing the Coherence of Generated Realistic Images" - Reviewed metrics for assessing the realism of AI-generated images using GANs, transformers, and diffusion models.
Top 3.5% Worldwide | March 2025
Directed and mentored team members in cybersecurity disciplines, including cryptography, web exploitation, and digital forensics in this global CTF competition.
1st Place Hackathon | February - March 2024
Developed a Swift-based iOS app with waste detection and recycling rewards, earning 1st place in a hackathon. Implemented ML model for waste detection and integrated MapView for recycling locations.
Personal Project | December 2024 - Present
Developed and managed a home server on Raspberry Pi, hosting applications like cloud storage and web server using Docker containers. Managed through SSH with VPN access.
Zero-day vulnerabilities represent one of the most significant threats in cybersecurity today. These are flaws in software that are unknown to the vendor and for which no patch exists. In this post, I explore how these vulnerabilities are discovered, exploited, and mitigated in modern enterprise environments.
Phishing attacks have evolved significantly from the simple email scams of the past. Modern phishing campaigns use sophisticated social engineering techniques combined with technical exploits. This article breaks down the latest tactics and provides actionable defense strategies for organizations of all sizes.
As organizations increasingly migrate to cloud environments, understanding cloud security becomes paramount. This post covers essential security measures for AWS, Azure, and GCP deployments, including identity management, data protection, and network security configurations based on real-world experience.
Quantum computing poses both a threat and opportunity for cryptography. While quantum computers may break current encryption standards, quantum cryptography offers new possibilities. This article explores post-quantum cryptography and quantum key distribution from a security practitioner's perspective.
Enter the secret password to continue: