Théo Schwartz

Théo Schwartz

Cybersecurity Student · Paris

About

Who

IPSSI student (2025–2028), Paris. I build security tools that solve actual problems, not theoretical ones. Fascinated by failure modes — how code breaks, how networks fail, how assumptions crumble.

Am

Semi-nomadic by design. Currently Paris, but always moving. Music production isn't a hobby; it's how I think. Building synthesis patches, finding harmonic accidents between hardware and software.

I

Value pragmatism over everything. Build, learn through doing, document ruthlessly. My code solves real problems, not ego problems. The unglamorous work is what makes systems survive.

Technical Skills

Languages

Python
JavaScript
Bash
PHP
Lua
HTML/CSS

Security Tools

Metasploit
Burp Suite
Nmap
Wireshark
Linux

Environment

Kali Linux
VS Code
Git
Docker
VirtualBox
VMware

Certifications

SecNumacadémie

Panorama de la SSI92%
Sécurité de l'authentification90%
Sécurité sur Internet86%
Sécurité du poste de travail88%

ANSSI — Agence nationale de la sécurité des systèmes d'information

Commission Nationale de l'Informatique et des Libertés

Le RGPD et ses notions clés
Principes de la protection des données
Responsabilités des acteurs
DPO et outils de la conformité

Projects

View on GitHub

Password Analyzer

Built because I got tired of guessing password strength. Entropy scoring that actually works, pattern recognition for keyboard walks, predictable substitutions. Estimates real-world crack time using GPU benchmarks.

  • Scoring: entropy-based strength with practical heuristics.
  • Patterns: detects keyboard walks and common substitution habits.
  • Estimation: crack-time approximation using GPU benchmark baselines.
Python Security Cryptography
~800 LOC 2025 Active
View on GitHub

Web Vuln Analyzer

My first real security tool. Automates the boring part, testing. Finds SQLi, XSS, CSRF, path traversal, parameter pollution. The insight: generate context-aware payloads.

  • Automation: crawl + test loop to reduce manual recon.
  • Coverage: targets SQLi, XSS, CSRF, traversal, parameter pollution.
  • Payloads: context-aware generation rather than naive fuzzing.
Python HTTP BeautifulSoup
~1200 LOC 2024 Active
View on GitHub

Steganography Toolkit

LSB steganography, EXIF manipulation, metadata injection. Hide data in images imperceptibly — the eye won't catch what statistics can't explain.

  • Techniques: LSB steganography + EXIF/metadata manipulation.
  • Workflow: hide + extract utilities designed for real scenarios.
Python PIL Processing
~600 LOC 2024 Research
View on GitHub

Interactive Narrative Engine

Passion project. Interactive fiction engine built on state machines. Branching dialogue with real consequences. Built to prove a thesis: games and serious tools are the same architecture.

  • Core: state-machine driven story logic.
  • Design: branching dialogue with meaningful consequences.
  • Architecture: tool-like structure applied to game systems.
JavaScript HTML5 JSON
~400 LOC 2023 Experimental

Education

2023—2025 / Annecy

Lycée Lachenal

Baccalauréat NSI · Sciences de l'Ingénieur

Informatique Systèmes

Systems thinking — comprendre l'interaction, la cascade, la faille. Fondations d'ingénierie — résoudre à l'échelle structurelle. Électronique & systèmes numériques — la théorie rencontre la réalité physique.

Formation
  • Baccalauréat Général
  • Spécialité: SIN
  • Annecy, France
Matières
  • Numérique et Sciences Informatiques
  • Mathématiques
  • Sciences de l'Ingénieur
  • Physique-Chimie
Projets
  • Réseaux de capteurs IoT
  • Systèmes embarqués Linux
  • Protocoles réseau
  • Automatisation industrielle
2025—2028 / Paris

IPSSI — Bachelor Cybersecurity

Sécurité offensive · Architecture systèmes

Année 1 En cours

Architecture systèmes — comprendre la machine à attaquer. Protocoles & sécurité réseau — comment l'internet échoue. Sécurité offensive — penser comme un attaquant.

Formation
  • Bachelor Cybersécurité
  • Année 1 (2025-2026)
  • Fin prévue: 2028
  • Paris, France
Modules
  • Architecture des systèmes
  • Protocoles & sécurité réseau
  • Sécurité offensive
  • Administration Linux
  • Tests de pénétration
Outils
  • Kali Linux, Metasploit
  • Burp Suite, Wireshark
  • Nmap, OWASP Tools
  • John the Ripper

Practice Platforms

Root-Me
Root-Me
TryHackMe
TryHackMe

Contact

Let's Connect

N'hésitez pas à me contacter pour toute opportunité, collaboration ou question.

Email
schwartz.th@proton.me
Réponse 24h
GitHub
@ctctchm
Root-Me
ctctchm