Cybersecurity professional with a red-team mindset focused on penetration testing, network vulnerability assessment, and threat intelligence. I develop specialized tools for OSINT investigations, DDoS protection, and security automation on Linux environments.
- Penetration Testing: Comprehensive security assessments using industry-standard tools and custom exploits
- Network Scanning & Enumeration: Development of specialized scanners for threat detection and vulnerability assessment
- OSINT Investigations: Advanced techniques for gathering actionable intelligence from public sources
- DDoS Mitigation: Implementation of sophisticated protection strategies using Cloudflare and custom solutions
- Threat Modeling: Identification of potential attack vectors and implementation of countermeasures
- Security Automation: Creation of streamlined workflows for rapid incident response
skills = {
"languages": ["Python", "Bash", "Go"],
"offensive_tools": ["Metasploit", "Nmap", "Burp Suite", "Custom Scanners"],
"defensive_tools": ["Wireshark", "Cloudflare", "Suricata", "OSSEC"],
"environments": ["Kali Linux", "Ubuntu", "Arch Linux"],
"methodologies": ["OSINT", "Network Mapping", "Vulnerability Assessment", "Exploit Development"]
}
Advanced network scanner leveraging masscan to identify and evaluate active Ollama instances across the internet, enhancing threat detection capabilities.
# Key features
- High-performance scan techniques
- Detailed vulnerability assessment
- Comprehensive reporting
PoC utility demonstrating the exploitation of Valve Source Engine servers as DDoS amplification vectors, highlighting the intersection of offensive and defensive security.
Robust OSINT tool utilizing the BT Phonebook with ripgrep for rapid extraction of intelligence from PDFs, optimized for security investigations.
Implementation of ASN blocking, geoblocking, and other techniques for robust web infrastructure protection via Cloudflare.
Streamlined OSINT tool designed for aggregating and analyzing social media data linked to specific usernames.
Security tool using Selenium to create precise webpage replicas for phishing awareness training and security analysis.
- Advanced Evasion Techniques: Developing methodologies to bypass modern detection systems
- Vulnerability Hunting: Researching vulnerabilities in common network protocols
- DDoS Evolution: Creating next-generation mitigation strategies for emerging attack vectors and researching common threats
- Automated Threat Intelligence: Building systems to collect, analyze, and act on threat data
"The best defense is understanding the offense."