___    _   ____________  ____  _   ____  __________  ____________
   /   |  / | / /_  __/ / / / __ \/ | / /\ \/ /_  __/ / / / ____/ __/
  / /| | /  |/ / / / / /_/ / / / /  |/ /  \  / / / / / / / /_  / /_
 / ___ |/ /|  / / / / __  / /_/ / /|  /   / / / / / /_/ / __/ / __/
/_/  |_/_/ |_/ /_/ /_/ /_/\____/_/ |_/   /_/ /_/  \____/_/   /_/

Cybersecurity Engineer with 7+ years of experience across offensive security, DevSecOps, cloud security, and security automation. Specialized in red teaming, penetration testing, and building automated security tooling — with a growing focus on AI-driven security solutions and LLM security research. 200+ engagements delivered across enterprise, government, and financial sectors.

4 Writeups
5 Articles
23 Topics
9 Total Posts

latest

Recent posts and writeups

2026-04-22 USB Rubber DuckyRed TeamEvasionHacker gadgetsIntial Access

Weaponizing the Rubber Ducky with Adaptix C2 : Part 2

In Part 2 of the Hak5 Toolkit series, We will walktrough hor to chain together an AMSI bypass, a Constrained Language Mode bypass, and shellcode obfuscation to achieve in-memory code execution all delivered via the USB Rubber Ducky.

2026-04-19 Intial AccessRed TeamPhysical SecurityHacker gadgets

Getting Initial Access with USB Rubber Ducky + Adaptix C2

A walkthrough of USB Rubber Ducky from USB to Shell and Chaining with Adaptix C2 for Initial Access.

2026-04-12 artificial-intelligenceappsecautomationbug-bounty

Hooking Claude into Burp Suite with MCP

A walkthrough of connecting Burp Suite to Claude using the Model Context Protocol.

2025-09-23 application-securityappsecdevsecopsred-teaming

Exploiting a Banking Playground - Vulnerable Bank Application

A walkthrough of exploiting a purposely vulnerable banking application, replicating common issues encountered during real-world security assessments including SQL injection, mass assignment, JWT forgery, and business logic flaws.

2025-05-08 hak5lan-turtleinitial-accessred-teaming

Plug & Pwn Chronicles - LAN Turtle

A hands-on guide to deploying the Hak5 LAN Turtle for covert network access during Red Team engagements, covering setup, reverse SSH tunneling, and pivoting with ProxyChains.

root@blog:~# No matching posts found.

ESC