I am a Security Engineer (OSEP, CRTE) specializing in full-scope penetration testing, enterprise infrastructure hardening, and detection engineering. My methodology blends the precision of modern cloud security with the "break and rebuild" mindset of an offensive operator.
- 🔭 Current Campaign: Head of Security Engineering @ Sports Excitement.
- 🛠️ Hacker Arsenal: Python, C#, Splunk, AWS IAM, networkx, Sliver, structlog.
- ⚡ Critical Hit: Architected zero-trust VPS infrastructure, authored custom AV/EDR evasion payloads, and mapped 1,000+ AWS IAM nodes in seconds using graph analysis.
| Offensive [RED] | Defensive [BLUE] | Development [SYSTEM] |
|---|---|---|
| AD Exploitation (Mimikatz, Rubeus, BloodHound) | Cloud Defense (AWS GuardDuty, CloudTrail) | Languages (Python, Bash, PowerShell, C#) |
| AV/EDR Evasion (Process Hollowing, AMSI/ETW) | Detection Eng. (Splunk Correlation Rules) | Infrastructure (Docker, Terraform, Boto3) |
| Payload Engines (XOR, AES, Shellcode Runners) | Network Sec (Cloudflare WAF, NAT Gateways) | Data/Analysis (SQLite, YAML, networkx) |
- Aegis | AI Exploitation & Guardrail Inspection Suite targeting LLM prompt injections (gpt-4o).
- Domino | Graph-based AWS IAM Privilege Escalation Path Prover using
networkx. - Malforge | Advanced Shellcode & Payload Engine featuring stackable encryption layers for EDR evasion.
- Sentinel Forge | Dockerized AWS Cloud Detection & Response Lab tracking adversarial telemetry.

