Erik Walther Portfolio Erik Walther

Programming, Hacking & Privacy

erikwalther.eu

2 weeks, 4 days ago

This portfolio is self-hosted and maintained by me. It serves as my personal testing ground where I apply theoretical knowledge directly in practice, with a strong focus on security hardening and advanced Python development. I deliberately chose Django to challenge myself with a production-ready framework, building not only a secure architecture but also ensuring a robust and well-designed user experience.

Beyond technical security measures, I have also integrated a detailed SEO strategy. I ensure the content is not only secure but also well-indexed and understandable for crawlers. This creates a balance between maximum privacy and security on the backend, and optimal visibility on the frontend.

Explore erikwalther.eu

Boot.dev

2 weeks, 4 days ago

I'm currently deepening my core programming expertise through the boot.dev curriculum, with a strong emphasis on mastering:

Language Primary Application
Python Custom reconnaissance scripts, API aggregation, security utility prototyping
JavaScript Client-side vulnerability analysis, XSS payloads, prototype pollution
SQL Injection flaw identification and exploitation

These three languages form the backbone of modern security tooling. My goal is to translate theoretical knowledge into practical automation and exploitation skills specifically tailored for bug bounty hunting.

By building a robust foundation across these languages, I aim to move beyond relying solely on existing tools and toward developing bespoke scripts that:

  • Streamline my workflow
  • Surface subtle vulnerabilities
  • Give me a genuine edge in competitive bug bounty programs

The end goal isn't just finding bugs, it's building the skill set to find them faster and more reliably than the competition.

Explore Boot.dev

Hack The Box

2 weeks, 4 days ago

I'm currently building my foundational hacking skills through the Hack The Box curriculum, working toward the level needed to qualify for bug bounty programs. This training gives me hands-on experience with core concepts like:

  • Enumeration
  • Privilege escalation
  • Web application vulnerabilities

These are the essentials of any security researcher's toolkit.

Qualifying for bug bounty programs is a milestone, not a destination. Application security is vast and moves fast:

  • New attack surfaces appear as technologies shift, frameworks update, and development practices change
  • What's a critical vulnerability today may be patched tomorrow
  • Entirely new exploit classes emerge to replace old ones

Closing the gap between theory and real-world research takes more than finishing a curriculum, it takes continuous learning and extensive practice against live targets.

This is exactly where I want to bring together what I've learned at boot.dev and what I'm practicing on Hack The Box. The programming foundation I'm building, Python for automation, JavaScript for client-side analysis and SQL for injection work, isn't separate from my hacking training. It's the bridge. Custom tooling, scripted enumeration, and the ability to read and exploit source code are what turn guided exercises into real-world capability. Applying boot.dev's programming curriculum directly to Hack The Box challenges and live bug bounty targets is how I move from following walkthroughs to thinking and operating independently.

Competing as a security researcher means going beyond guided exercises and known techniques. It means developing:

  • The intuition to spot novel vulnerabilities
  • The persistence to dig deeper where others stop
  • The adaptability to keep up with an ever-changing threat landscape

That's the standard I'm working toward, and I'm committed to putting in the time and effort to get there.

Explore Hack The Box

PrivacyPal

2 weeks, 4 days ago

PrivacyPal is more than a high-performance, non-exit Tor relay. It is a commitment to strengthening the Tor network in an increasingly surveilled world.

This project acts as my open ledger, detailing every decision, challenge, and triumph:

  • Secure and highly performant hosting
  • Initial setup and configuration
  • Update and maintenance strategy
  • Dealing with abuse messages

Nothing is hidden. I believe true privacy infrastructure relies on trust and shared knowledge. By documenting the entire process, I aim to inspire and guide fellow advocates in building a more private internet. Through radical transparency, we collectively strengthen our defenses against intrusive monitoring.

Explore PrivacyPal