🔐 Penetration Tester & Security Researcher
Experienced in exploit development, reverse engineering, vulnerability research, and adversary emulation — with a focus on uncovering complex attack paths and engineering resilient enterprise defenses.
- 🔎 Expertise: Penetration testing & security research with hands‑on experience in exploit development, reverse engineering, vulnerability research, and adversary emulation
- 🛡️ Foundations: Strong background in networking, Linux, and cybersecurity; focused on uncovering complex attack paths and building resilient defenses
- ⚡ Technical Skills: Proficient in C++, Python, and JavaScript for exploit prototypes, automation, and web security testing
- 🎯 Professional Growth: Actively pursuing the Offensive Security track (OSCP, OSWE, OSED)
- 🌍 Focus Areas: Red teaming, exploit development, and adversary emulation aligned to real‑world threat models
Languages & Scripting
C++ Python JavaScript Bash PowerShell SQL
Operating Systems
Windows Linux (Kali, ParrotOS, Ubuntu) macOS
Offensive Tools
Burp Suite Nmap Wireshark Metasploit BloodHound CrackMapExec Responder Mimikatz
Defensive & SOC Tools
Velociraptor Wazuh Elastic Stack
Core Competencies
Reverse Engineering Malware Analysis Threat Intelligence Red/Blue Teaming
🔹 ShadowOps‑Lab v2.0.0 ✅
A reproducible red+blue security framework engineered with audit‑grade rigor, demonstrating adversarial simulation and SOC defense with reproducibility standards.
🔹 Apple Security Bounty ✅
Discovered and responsibly disclosed a critical macOS ImageIO framework vulnerability as part of Apple’s Security Bounty program, delivering reproducible proof‑of‑concept and validated remediation.
🔹 Active Directory Attack & Defense Lab 🚧
Currently under development — a custom AD lab simulating enterprise environments, covering enumeration, credential abuse, privilege escalation, and Sigma‑style detection strategies.
⭐️ “Breaking systems like an adversary, defending them like a SOC analyst — with reproducible, audit‑grade workflows.”