🎯 Red Team Certified

Advanced Red Team Operations & Exploit Development

Focused on Active Directory attacks, Web Application Security, and building custom Red Team tools. Currently learning and growing through hands-on practice on platforms like Hack The Box and PortSwigger Academy.

Focus Advanced Red Teaming
Specialization Advanced Exploit Development
Languages Python · C++ · C · JavaScript · Bash
Tools BurpSuite · Metasploit · Nmap

👤 About Me

Cybersecurity specialist with hands-on experience in red team operations and penetration testing. My focus areas include Active Directory attacks, Web Application Security, and Network Penetration Testing.

Currently ranked #189 globally on Hack The Box with Elite status, demonstrating consistent excellence in penetration testing and vulnerability research. I specialize in creating custom tools and frameworks that push the boundaries of traditional red team methodologies.

My approach combines deep technical knowledge with practical real-world application, ensuring that security assessments provide maximum value through realistic attack simulation and comprehensive post-exploitation scenarios.

🎯
Precision Targeting

Advanced reconnaissance and attack vector identification

Rapid Exploitation

Quick identification and exploitation of critical vulnerabilities

🔒
Stealth Operations

Advanced evasion techniques and anti-forensics methods

🏆 Achievements & Recognition

Elite Hacker

Hack The Box Elite Status

0 Global Rank
0+ Machines Solved
0+ Challenges Solved

Achieved Elite status through consistent performance in advanced penetration testing challenges and real-world attack simulations.

🛡️

Advanced Exploitation Techniques

Mastered sophisticated attack vectors including buffer overflows, ROP chains, and kernel exploitation across multiple architectures.

🔬

Security Research

Active contributor to the security community with focus on Linux privilege escalation and post-exploitation techniques.

🛡️ Core Expertise

Active Directory Attacks (Kerberoasting, DCSync, Pass-the-Hash)
Web Application Security (XSS, SQLi, SSRF, IDOR)
Network Penetration & MITM Attacks
Linux/Windows Privilege Escalation
Exploit Development (Python/C/C++/Assembly)
Post-Exploitation & Lateral Movement
Binary Analysis & Reverse Engineering

🛠️ Tools & Technologies

Operating Systems
Windows Windows
Ubuntu Ubuntu
Kali Linux Kali Linux
Arch Linux Arch Linux
Programming & Scripting
Python Python
C++ C++
C C
Assembly
JavaScript JavaScript
Bash Bash
Cybersecurity Tools
Burp Suite Burp Suite
Bloodhound Bloodhound
Mimikatz
Nmap Nmap
RE & Analysis
Ghidra Ghidra
IDA Pro
Wireshark Wireshark
Metasploit Metasploit
DevOps & Essentials
Git Git
Docker Docker
SQL SQL
VirtualBox VirtualBox
VMware VMware

🚀 Featured Projects

AutismOS

C · Assembly · OS Development

Minimalistic educational operating system designed for learning low-level system programming, focusing on bootloading, interrupts, and hardware interaction.

3 Stars

watsons-poc

HTML · Security Research · PoC

Proof of Concept for a client-side API redirection vulnerability discovered in a queue system. Demonstrates the security impact with responsible disclosure (patched).

Security Research

Dictionary-Of-Pentesting

Shell · Wordlists · Pentesting

Comprehensive collection of wordlists, payloads, and resources for penetration testing and red team operations. Curated for maximum effectiveness.

lyly-OS

Makefile · Assembly · Kernel Dev

A minimalist operating system for learning and experimentation. Explores OS fundamentals including bootloaders, memory management, and kernel development.

Red Team Toolkit

Python · C++ · Exploitation

Collection of custom tools and scripts for red team operations, including payload generators, privilege escalation helpers, and post-exploitation utilities.

Coming Soon

🤝 Connect & Collaborate

Available for advanced security assessments, red team engagements, and security research collaborations.