About
Security Engineer and Penetration Tester with extensive expertise in leading security frameworks, including OWASP Top 10, Microsoft SDL, MITRE ATT&CK, and SANS Top 25.
With a deep understanding of industry-standard security tools and frameworks, I have hands-on experience with Burp Suite, Metasploit, Nessus, nuclei, Bloodhound, and Nmap, along with security monitoring solutions like Snort, Wazuh, and Suricata. My skill set extends to advanced post-exploitation techniques using tools like BetterSafetykatz, Semgrep, Appscan, Empire, NetExec (NxC), PowerSploit, PowerView, and PingCastle.
I am proficient in scripting across multiple languages, including Python, Bash, and PowerShell, and regularly work with modern C2 frameworks such as Havoc C2.
In addition to tools, I am well-versed in security frameworks and concepts, including the OWASP Top 10, SANS Top 25, Microsoft SDL, and MITRE ATT&CK Framework. My work spans the SDLC, focusing on secure development practices with Static and Dynamic Application Security Testing (SAST & DAST), Software Composition Analysis (SCA), and adhering to industry standards like OSSTMM and PTES for penetration testing methodologies.
Certifications:
- Certified Red Team Professional (CRTP - Altered Security)
- Certified Penetration Testing Specialist (CPTS - Hackthebox)
- Offensive Security Certified Professional\+ (OSCP _ Offsec)
CVEs:
- CVE-2024-44871
- CVE-2024-44872
- CVE-2024-55341
- CVE-2024-55342
Hacking Labs Progress:
- Tryhackme - https://tryhackme.com/p/secfortress
- Hackthebox - https://app.hackthebox.com/profile/623459