Software Engineer and Cybersecurity Researcher from Spain πͺπΈ specializing in Cyber Threat Intelligence and adversary emulation, using offensive methodologies to simulate real-world attacks and improve defensive capabilities against evolving threats.
-
Deepfinder - Search attributes easily using dot paths. Within structures of type dictionary, list and embedded substructures with simple format 'dict.users.0.name'.
-
Python DDD Skeleton - Template of a Python & FastAPI application using Domain-Driven Design and Command Query Response Segregation principles.
- Digital Twin for Adaptive Adversary Emulation in IIoT Control Networks - The paper proposes a framework that uses digital twins to emulate adaptive cyber adversaries in industrial IIoT control networks. The approach creates a virtual replica of the industrial system where automated attackers, driven by reinforcement learning, interact with the environment and adapt their strategies to identify and exploit critical nodes. By combining system modeling with structural analysis and adversarial learning, the framework enables the generation of realistic and dynamic attack scenarios without impacting real industrial infrastructure. This environment can be used to evaluate defensive mechanisms, analyze system resilience, and support proactive cybersecurity testing in critical industrial networks.



