Hi, I'm Jonathan Lluch 👋🏻

I have spent over a decade in the Digital Marketing and Communication sector, leading projects and ventures that shaped my journey and brought me to where I am today.

In recent years, I made the bold decision to shift gears and fully dedicate myself to Cybersecurity and Ethical Hacking. My marketing phase had run its course—it was time for a new challenge.

Technology, cybersecurity, and computers have always been my passion. I’ve always been a bit of a geek at heart.

So, I took the leap, diving headfirst into this new adventure—starting from scratch in the world of tech and cybersecurity.

My commitment to Law Enforcement places me on the right side of history. I don’t just want to understand the digital battlefield—I want to fight on the front lines, tracking down cybercriminals and making the digital world a safer place.

My mission is clear: help organizations and businesses defend against cyber threats, respond effectively to attacks, and hunt down those who seek to exploit the system.

🦸‍♂️ My superpowers

Now, let me introduce you to my superpowers as a hero (my specializations.)

If we were in a Marvel movie, I’d have unique abilities that set me apart, making me a one-of-a-kind justice warrior fighting on the right side of history.

Oh, and in case you’re wondering, Captain America is my favorite. 🇺🇸🛡️

Here are my real-life skills, my superpowers:

PENTESTING

I call it the power of the click.

Hundreds of hours of practice in ethical and controlled environments have given me a superpower. With a single click, I can access millions of pieces of sensitive information right from my console.

This kind of power can be used for good or evil.

But in my case, I stand on the right side of history. I’m here to catch the bad guys.

OSINT

The Power of Knowing Everything About Someone

That’s priceless.

This superpower gives me access to publicly available information from across the internet data that exists but remains invisible to most. Your email, phone number, address, workplace, past vacations… and much more.

Once again, I stand on the right side of history. But not everyone does—there are bad actors out there with the same power.

Bug Bounty

The Power to Explore Where Others Can’t

Bug Bounty programs are initiatives by companies and organizations that offer financial rewards to security researchers and ethical hackers for discovering and reporting vulnerabilities in their systems.

I actively participate in several of these programs, helping to identify security flaws for major international companies like Google, Netflix, Microsoft, Yahoo, YouTube, WordPress, and more.

MARKETING AND ANALYTICS

Experience: The Power of Understanding the Digital World

With over a decade in digital marketing, I’ve gained a deep understanding of how the online world operates, along with mastery of essential tools and strategies from the marketing industry.

Websites, digital analytics, social media, algorithms, content creation…etc.

👨‍🎓 My Training & Certifications

The Source of My Superpowers

Here, I share a bit about the training and certifications that have helped me develop my superpowers and establish myself as an online vigilante.

All of them have been 100% in English, and I’m also learning Russian.

Google Cybersecurity Certificate

eJPT Certification por INE Security

image

Check the diploma

👾 ¿Wanna Play? 👾

This is my favorite game, and I’ve added it to my website so I can play whenever I want—and so can you!

Press the spacebar or arrow keys to start playing.

My record: 4320 🏆

Think you can beat me? Give it a shot!

👨‍💻 My portfolio of Hacks, Vulnerabilities and Projects

In virtual, controlled, and legal environments, I’ve hacked machines, solved challenges, and completed various online hacking games (TryHackMe, OverTheWire, Hack The Box, etc.).

I’ve also discovered vulnerabilities in real-world environments and companies.

Here’s everything you need to know:

How to Overcome OverTheWire Levels 0-6

As a beginner in cybersecurity, I started playing OverTheWire: Bandit to practice everything I’ve learned. I needed to look up some information, so I think you might be interested in knowing how...

🖥️ My own interactive CLI

I have developed a CLI in the purest Linux style with HTML in a simple way.

If you want to get my contact information or play with it, you will have to follow the instructions: Start by typing help.

CLI Interactiva
Bienvenido a mi propia terminal interactiva. Escribe 'help' para ver los comandos disponibles.
user@parrot-os:~$

Recent Posts

How to Analyze Malware Hidden in Images

If you’re looking for how to analyze malware hidden in images, you’re in the right...

Malware Hidden in Images: Steganography in Cybersecurity

In today’s digital world, cyber threats are constantly evolving, and cybercriminals are always...

Difference Between VPN and DNS in Cybersecurity

In cybersecurity, the terms VPN (Virtual Private Network) and DNS (Domain Name System) are essential...

Created with ☕ and ❤️ by myself on a Sunday afternoon 

Política de Privacidad y Aviso Legal

© 2025

Jonathan LLuch
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.