$ whoami

K0ljan
CTI Analyst & Engineer

Cyber Threat Intelligence analyst and engineer — I track threat actors, collect and correlate IOCs, analyze campaigns, and build intel reports. Passionate about automation and development: if something is repetitive, I build a tool/automation for it.

./blog./projects

// recent_posts

all posts →
[misc]Make N8N Webhooks Safe Again

Connect your Homelab N8N Server with ngrok and secure it with an nginx whitelist proxy

2026-03-17
#N8n#Webhooks#Automations#nginx#ngrok

// projects

./vigil-cti
privateWIP

CTI Case Management System tracks campaigns and IOCs. Structures intelligence workflows from collection to finished report.

PythonCTIAutomation

// about

I work at the intersection of threat intelligence and software engineering. My day-to-day is tracking adversaries and turning raw intel into actionable insights.

What sets me apart is the dev side — I automate the boring parts. IOC enrichment, report parsing, threat feed ingestion: if I do it more than twice, I script it.

THREAT INTELLIGENCE

OSINTDarknet ResearchLead Threat Intelligence Platform knowledgeCTI Tooling (MISP, OpenCTI, etc.)MITRE ATT&CKThreat Hunting

DEVELOPMENT & AUTOMATION

PythonTypeScriptAutomationDockerN8NREST APIs

OTHER

Web Pentesting BasicsNetworkLinux

// contact

Want to collaborate, share intel, or just talk hacking? Reach out.

GitHubTwitter / X