Documentation
Collection of documents on defensive cybersecurity, forensics, hacking, malware, and more.
Skilled cybersecurity professional with a proven track record in offensive security and infrastructure protection. Specialized in conducting comprehensive penetration tests and leading red team operations to identify and address security vulnerabilities before they can be exploited.
Red Teaming
Penetration Testing
Exploitation Techniques
Threat Hunting
Collection of documents on defensive cybersecurity, forensics, hacking, malware, and more.
A script for Digital Forensics and Incident Response (DFIR) that collects network configurations, active connections, and system data from a live Windows system. It uses built-in and third-party tools to gather information useful for forensic analysis and incident investigation.
Let's discuss your security needs