OSCP · In progress

Offensive security portfolio

Offensive security — Pentester Junior

I build realistic offensive projects, test attack paths in Active Directory and Web environments, and document every step of the reasoning. Currently in a cybersecurity bootcamp and preparing for the OSCP.

02 / About

An offensive profile built on curiosity, sharpened by method.

Self-taught, I learned offensive security by breaking systems, documenting every step, and starting over. A background in freelance development taught me how applications are built — which makes it easier to find where they break. Today I am building a pentest and red team profile, with the OSCP targeted for Q3 2026. I am looking for a first team to put it all to the test.

Discover my profile

03 / Practice

Active in the field, always moving forward.

I keep progressing through regular labs, Hack The Box practice, write-ups, and projects that turn repetition into sharper offensive judgment.

0+

Machines pwned

0

Write-ups published

0

Projects

03 / Blue team awareness

Junior pentester, with a real blue-team foundation.

My direction is offensive, but I can also investigate from the defensive side. That foundation makes me more aware of what my actions leave behind, what gets detected, and how a blue team thinks.

Investigation

aware

Analyze network traffic, read artifacts, and reconstruct what happened.

Detection

aware

Understand alerts, logs, and the signals that reveal abnormal activity.

Blue team awareness

aware

Think exploitation and defense together to produce more realistic attacks.

WiresharkSplunkSnort

04 / Projects

Latest projects

The two most recent public projects on the portfolio.

05 / Write-ups

Latest write-ups

Documenting my methodology, one machine at a time.

06 / Contact

Looking for a penetration tester?

I'm actively seeking my first professional role in offensive security. I bring structured methodology, solid documentation habits, and a serious passion for the craft.