___    _   ____________  ____  _   ____  __________  ____________
   /   |  / | / /_  __/ / / / __ \/ | / /\ \/ /_  __/ / / / ____/ __/
  / /| | /  |/ / / / / /_/ / / / /  |/ /  \  / / / / / / / /_  / /_
 / ___ |/ /|  / / / / __  / /_/ / /|  /   / / / / / /_/ / __/ / __/
/_/  |_/_/ |_/ /_/ /_/ /_/\____/_/ |_/   /_/ /_/  \____/_/   /_/

Cybersecurity Engineer with 7+ years of experience across offensive security, DevSecOps, cloud security, and security automation. Specialized in red teaming, penetration testing, and building automated security tooling — with a growing focus on AI-driven security solutions and LLM security research. 200+ engagements delivered across enterprise, government, and financial sectors.

4 Writeups
2 Articles
13 Topics
6 Total Posts

latest

Recent posts and writeups

2025-09-23 application-securityappsecdevsecopsred-teaming

Exploiting a Banking Playground - Vulnerable Bank Application

A walkthrough of exploiting a purposely vulnerable banking application, replicating common issues encountered during real-world security assessments including SQL injection, mass assignment, JWT forgery, and business logic flaws.

2025-05-08 hak5lan-turtleinitial-accessred-teaming

Plug & Pwn Chronicles - LAN Turtle

A hands-on guide to deploying the Hak5 LAN Turtle for covert network access during Red Team engagements, covering setup, reverse SSH tunneling, and pivoting with ProxyChains.

2025-03-03 htbwindowsprivesc MEDIUM

HackTheBox - Forest

Windows AD box - AS-REP Roasting, BloodHound ACL abuse, DCSync with Cobalt Strike, and WriteDACL exploitation.

2025-02-16 htbwindowshackthebox-walkthroughprivilege-escalationactive-directory EASY

HackTheBox: Cicada

Walkthrough for the HackTheBox Cicada machine, involving RID brute-forcing, SMB enumeration, credential discovery, and privilege escalation via SeBackupPrivilege abuse to dump SAM hashes.

2025-01-20 htbwindowshackthebox-walkthroughactive-directory MEDIUM

HackTheBox: Administrator

Walkthrough for the HackTheBox Administrator machine, a Windows Active Directory box.

root@blog:~# No matching posts found.

ESC