Specializing in penetration testing, red team operations, and security research to help organizations identify and remediate critical vulnerabilities before adversaries do.
Technical writeups, research, and security insights
A comprehensive guide to understanding and exploiting privilege escalation vulnerabilities in Windows Active Directory environments, including practical examples and mitigation strategies.
Read more →
A deep dive into techniques for evading endpoint detection and response solutions, including process injection, memory manipulation, and obfuscation methods used in real-world engagements.
Read more →
Learn how attackers leverage trust relationships between domains to move laterally and escalate privileges across forest boundaries in complex enterprise environments.
Read more →
Practical techniques for identifying and exploiting common AWS misconfigurations, including IAM policy abuse, S3 bucket enumeration, and Lambda function vulnerabilities.
Read more →
Step-by-step guide to setting up a professional red team infrastructure including command and control servers, redirectors, payload hosting, and operational security considerations.
Read more →
Exploring sophisticated web application vulnerabilities beyond OWASP Top 10, including business logic flaws, race conditions, and complex authentication bypass scenarios.
Read more →
Building security through adversarial thinking
I'm an offensive security professional with over 5 years of experience helping organizations understand their security posture through real-world attack simulations. My work spans across network penetration testing, web application security, cloud infrastructure assessments, and full-scope red team engagements.
I believe that the best way to defend is to understand how attackers think and operate. My approach combines deep technical knowledge with creative problem-solving to uncover vulnerabilities that automated tools might miss. I've worked with clients ranging from startups to Fortune 500 companies across finance, healthcare, and technology sectors.
Beyond client work, I'm passionate about contributing to the security community through research, tool development, and knowledge sharing. I regularly participate in bug bounty programs, contribute to open-source security projects, and stay current with the latest attack techniques and defensive strategies.
Technical skills and methodologies I employ in security assessments
Selected engagements and security research projects
Conducted comprehensive internal and external penetration testing for a Fortune 500 financial services company. Identified critical vulnerabilities in their infrastructure, achieved domain compromise, and provided strategic remediation guidance.
Led a 6-week adversary simulation for a healthcare organization. Successfully bypassed EDR solutions, maintained persistence, and demonstrated the impact of a sophisticated threat actor through lateral movement and data exfiltration scenarios.
Performed in-depth security assessment of a multi-tenant SaaS application. Discovered authentication bypass, broken access controls, and business logic flaws that could lead to cross-tenant data access.
Evaluated AWS environment security for a technology startup. Identified misconfigured IAM policies, exposed S3 buckets, and privilege escalation paths. Delivered comprehensive cloud security architecture recommendations.
Researched and developed proof-of-concept exploits for zero-day vulnerabilities in enterprise software. Responsibly disclosed findings to affected vendors and received CVE assignments.
Developed open-source security tools for reconnaissance automation, vulnerability validation, and post-exploitation activities. Tools have been adopted by security professionals worldwide with 2,000+ GitHub stars.
Professional certifications and credentials
Offensive Security Certified Professional
Offensive Security Experienced Penetration Tester
GIAC Penetration Tester
GIAC Exploit Researcher and Advanced Penetration Tester
Certified Red Team Operator
eLearnSecurity Web Application Penetration Tester eXtreme
Interested in working together? Let's discuss your security needs