Hashing Utility
A Python-based cryptographic hashing utility for automated integrity checks and file verification. Supports multiple hash algorithms for security tooling workflows.
// Penetration Tester & Security Researcher
Exploiting vulnerabilities before adversaries do. Specializing in red team operations, web & network penetration testing, and CTF competitions. Dedicated to turning zero-days into not-a-problem.
// 01. about
Independent security researcher focused on offensive security and cryptographic integrity. Currently mastering the HTB CPTS methodology and developing custom security tools in Python. Certified Ethical Hacker (CEH) with a drive for automated integrity auditing.
// 02. skills
Tools, techniques, and knowledge domains I operate with daily.
// 03. projects
Open-source tools and research I've built and published.
A Python-based cryptographic hashing utility for automated integrity checks and file verification. Supports multiple hash algorithms for security tooling workflows.
Modular automated exploitation framework written in Python. Supports plugin-based architecture for custom exploit modules, post-exploitation automation, and report generation.
Comprehensive web application reconnaissance suite combining passive OSINT, active scanning, and vulnerability fingerprinting into a single CLI tool.
Scripts and playbooks to automate Active Directory enumeration, BloodHound data collection, and attack path identification during red team assessments.
Proof-of-concept exploit for a critical authentication bypass vulnerability discovered through independent research. Responsibly disclosed and patched.
Red team phishing campaign setup automation: GoPhish deployment, domain categorization bypass, email template generation, and tracking dashboard.
Collection of purpose-built scripts for rapid CTF challenge solving: crypto solvers, binary patchers, steg extractors, and web exploit templates.
// 04. ctf & research
Selected challenge writeups and security research from competitions and independent work.
JWT algorithm confusion attack combined with SSRF to achieve RCE on the backend Flask server. Leveraged HS256/RS256 confusion to forge admin tokens.
Heap overflow vulnerability in a custom allocator. Exploited tcache poisoning to achieve arbitrary write and pop a shell via got.plt overwrite.
Lattice-based attack against a custom DSA variant with biased nonces. Used LLL reduction to recover the private key from a small number of signatures.
Full AD domain compromise via Kerberoasting → cross-forest trust abuse → shadow credentials attack to achieve DA on a multi-domain environment.
Prototype pollution in a Node.js app leading to RCE via the vm2 sandbox escape. Chained with a deserialization gadget for persistent access.
Windows event log forensics. Traced lateral movement through WinRM, identified the initial access vector via 4624/4625 logon events, and recovered attacker TTPs.
// 05. contact
Whether you're looking to hire a penetration tester, collaborate on security research, or discuss a responsible disclosure — my inbox is open. I respond to all serious enquiries.
For vulnerability reports, please use the PGP-encrypted channel or the secure contact form. For general enquiries, any channel works.