Computer Science undergraduate focused on offensive security. I learn by building and breaking, currently engineering a custom C2 framework and a hardware implant to solidify my penetration testing methodologies. Actively seeking offensive security internships and always open to connecting with others in the space, so don't hesitate to reach out.
01.Skills
Languages & Frameworks
Security Tools
02.Featured Projects
Custom C2 Framework
A custom Command and Control framework built from scratch, featuring a Python Flask team server, cross-compiled Go implants with AES-256-GCM encryption, HTTPS certificate pinning, browser profile spoofing, and full OPSEC hardening across network, binary, and host detection surfaces.
Out-of-Band Network Implant Project
My plans for a hardware implant that uses a Pi Zero 2 W and 4G LTE to build a covert C2 tunnel, bypassing perimeter firewalls completely. Everything here can and will probably be changed.
03.Writeups
HTB: Silentium
Walkthrough of the HackTheBox Silentium machine.
HTB: Kobold
Walkthrough of the HackTheBox Kobold machine.
HTB: CCTV
Walkthrough of the HackTheBox CCTV machine.
04.Blogs
C2 Development from Scratch: Fixing Every IOC - Phase 2 Walkthrough
Taking a loud C2 framework and systematically closing every detection surface I documented in Part 1. Browser spoofing, AES-256-GCM, COM-based persistence, certificate pinning, and the engineering problems behind each fix.
C2 Development from Scratch: Phase 1 Teardown
A teardown of a Phase 1 Command and Control framework, its architecture, its engineering decisions, and every way a Blue Team would catch it.
The Moment I Realized I Was Memorizing Instead of Learning
This article is about what I learned failing an "Easy" HackTheBox machine. It is a self-reflection about how I fixed my way of thinking when approaching problems.
05.Accomplishments
Practical Network Penetration Tester (PNPT)
CertificationIn progress...