Théo Schwartz

Théo Schwartz

Cybersecurity Student · Paris

ABOUT

Who

19, student at IPSSI (2025‑2028), Paris. I build security tools that actually solve real problems. I’m fascinated by how code breaks and how systems fail.

Am

I’m from Annecy, now living in Paris for my studies. I learn by doing, testing my own projects, and hunting for flaws. I move a lot—not randomly, but to explore, understand, and create.

I

Pragmatism above all. Build, fix, document. My code solves real problems, not egos. Hard bugs, broken systems… that’s where I learn the most.

TECHNICAL SKILLS

Languages

Python
JavaScript
Bash
PHP
Lua
HTML/CSS

Security Tools

Metasploit
Burp Suite
Nmap
Wireshark
Linux

Environment

Kali Linux
VS Code
Git
Docker
VirtualBox
VMware

CERTIFICATIONS

SecNumacadémie

ANSSI — Agence nationale de la sécurité des systèmes d'information

Panorama de la SSI 92%
Sécurité de l'authentification 90%
Sécurité sur Internet 86%
Sécurité du poste de travail 88%
Certified

Atelier RGPD

Commission Nationale de l'Informatique et des Libertés

Le RGPD et ses notions clés
Principes de la protection des données
Responsabilités des acteurs
DPO et outils de la conformité
Completed

Linux Unhatched

Networking Academy (Cisco Networking Academy)

Maîtrise des fondamentaux Linux et de la ligne de commande
Navigation système, gestion des fichiers et des permissions
Utilisation des outils Linux pour le diagnostic et le réseau
Application des bonnes pratiques de sécurité et d'administration
Completed

PROJECTS

View on GitHub

Password Analyzer

Built because I got tired of guessing password strength. Entropy scoring that actually works, pattern recognition for keyboard walks, predictable substitutions. Estimates real-world crack time using GPU benchmarks.

  • Scoring: entropy-based strength with practical heuristics.
  • Patterns: detects keyboard walks and common substitution habits.
  • Estimation: crack-time approximation using GPU benchmark baselines.
Python Security Cryptography
~800 LOC 2025 Active
View on GitHub

Web Vuln Analyzer

My first real security tool. Automates the boring part, testing. Finds SQLi, XSS, CSRF, path traversal, parameter pollution. The insight: generate context-aware payloads.

  • Automation: crawl + test loop to reduce manual recon.
  • Coverage: targets SQLi, XSS, CSRF, traversal, parameter pollution.
  • Payloads: context-aware generation rather than naive fuzzing.
Python HTTP BeautifulSoup
~1200 LOC 2024 Active
View on GitHub

Steganography Toolkit

LSB steganography, EXIF manipulation, metadata injection. Hide data in images imperceptibly — the eye won't catch what statistics can't explain.

  • Techniques: LSB steganography + EXIF/metadata manipulation.
  • Workflow: hide + extract utilities designed for real scenarios.
Python PIL Processing
~600 LOC 2024 Research
View on GitHub

Interactive Narrative Engine

Passion project. Interactive fiction engine built on state machines. Branching dialogue with real consequences. Built to prove a thesis: games and serious tools are the same architecture.

  • Core: state-machine driven story logic.
  • Design: branching dialogue with meaningful consequences.
  • Architecture: tool-like structure applied to game systems.
JavaScript HTML5 JSON
~400 LOC 2023 Experimental

CONTRIBUTIONS

GitHub Activity
@ctctchm

EDUCATION

Cliquer pour développer
2023—2025 / Annecy

Lycée Lachenal

Baccalauréat NSI · Engineering Sciences

Computer Science Systems

Systems thinking — understanding interaction, cascade, failure. Engineering foundations — solving at structural scale. Electronics & digital systems — theory meets physical reality.

Program
  • General Baccalauréat
  • Specialty: SIN
  • Annecy, France
Subjects
  • Computer & Digital Sciences
  • Mathematics
  • Engineering Sciences
  • Physics-Chemistry
Projects
  • IoT sensor networks
  • Embedded Linux systems
  • Network protocols
  • Industrial automation
Click to expand
2025—2028 / Paris

IPSSI — Bachelor Cybersecurity

Offensive security · System architecture

Year 1 In progress

System architecture — understanding the machine to attack. Protocols & network security — how the internet fails. Offensive security — thinking like an attacker.

Program
  • Bachelor Cybersecurity
  • Year 1 (2025-2026)
  • Expected end: 2028
  • Paris, France
Modules
  • System architecture
  • Network protocols & security
  • Offensive security
  • Linux administration
  • Penetration testing
Tools
  • Kali Linux, Metasploit
  • Burp Suite, Wireshark
  • Nmap, OWASP Tools
  • John the Ripper

PRACTICE PLATFORMS

Root-Me
TryHackMe
TryHackMe

CONTACT

Let's Connect

Feel free to reach out for any opportunity, collaboration, or question.

Email
Click to reveal
24h response
GitHub
@ctctchm
Root-Me
ctctchm