Mikal Celis

I’m Mikal Celis, a cybersecurity major at Texas A&M University–San Antonio with a strong passion for ethical hacking, digital defense, and problem-solving. I specialize in hands-on projects that explore network security, penetration testing, and OSINT. Whether I’m analyzing vulnerabilities in IoT firmware or building custom scripts in Python, I approach every project with focus, curiosity, and a commitment to real-world application. I’m steadily building my professional portfolio to reflect not only what I’ve learned academically, but how I apply that knowledge to solve complex challenges in the evolving cybersecurity landscape. I’m currently seeking opportunities to collaborate, contribute to open-source, and continue leveling up my technical toolkit.

My Favorite OSINT Tool and Why

One of my favorite OSINT tools as of right now is Google Dorking. To simply explain what it is: it’s using advanced search operators such as filetype:pdf. These are specifications in the search bar that allow us to uncover information Google would usually filter out. You can find secret login pages or downloadable PDFs that aren’t really meant for public view.

One thing I’ve learned in cybersecurity is that most systems or companies often have some level of exposure — whether that’s through login pages, open files, or even leaked credentials. During a legal penetration test, Google Dorking is an excellent place to start checking for weaknesses exposed through search engines.

Of course, always remember to stay within legal boundaries. Only access data you’re permitted to. Still, it’s fascinating to see the kind of information floating around the public internet.