Offensive security learner and aspiring penetration tester with a strong foundation in computer science, including C, Python, and operating system internals, alongside a solid background in networking.
I leverage this knowledge to understand and execute real-world attack paths, focusing on Active Directory, web exploitation, privilege escalation, and network interactions, while building custom tools and documenting full exploitation chains.
My goal is to develop a structured and in depth approach to penetration testing. Feel free to explore the writeups and review the code i wrote down below.
- Mitigation
- What is a Web Shell
- What is a reverse shell
- File transfer via Python Web server
- Offline Hash Cracking
- BloodHound
- Lateral Movement
- Privilege escalation
- Using Automated Scripts
- Abusing Sudo Privileges
- Abusing Cron Jobs
- Abusing GPP
- DCSync Attack
- Kerbrute
- Kerberoast
- AS-REP roasting
- DACL abuse
Feel free to reach out for opportunities, collaborations, or any questions: