Who I Am
I am a penetration tester and red team operator specializing in adversary simulation, external and internal network testing, cloud assessments, and covert physical intrusion. My work ranges from hands-on technical exploitation to high-level reporting and advisory, with an emphasis on clarity, tradecraft, and repeatability.
I value simplicity, craftsmanship, and the quiet discipline of learning. Much of my work is influenced by analog tools, retro computing aesthetics, and an interest in how technology can be understood more deeply by reducing distractions and focusing on fundamentals.
What I Do
My professional background spans external attack surface mapping, Active Directory compromise, cloud IAM analysis, mobile application testing, social engineering, and physical security. I’ve led red team engagements across enterprise and industrial environments, delivered technical and executive reporting, and helped organizations understand both their weaknesses and their defensive opportunities.
Outside of client work, I build offensive tools, study legacy systems, experiment with RFID/NFC hardware, and maintain a homelab for adversary simulation and detection engineering.
How I Work
My approach is grounded in:
- Curiosity — Understanding systems deeply and asking how they break.
- Repeatability — Building tooling and processes that scale.
- Restraint — Avoiding unnecessary complexity; keeping the essentials visible.
- Communication — Writing clearly, documenting thoroughly, and explaining risks honestly.
I believe offensive work is at its best when it is methodical, honest, and grounded in reality rather than theatrics.
Interests
I’m interested in:
- Offensive security tooling and automation
- Physical red teaming and hardware attacks
- Adversary simulation and detection engineering
- Legacy systems, COBOL, and good old 20th century computing
All projects, writeups, and research notes are my own and are written for educational and professional purposes.