Offensive security portfolio
Offensive security — Pentester Junior
I build realistic offensive projects, test attack paths in Active Directory and Web environments, and document every step of the reasoning. Currently in a cybersecurity bootcamp and preparing for the OSCP.
02 / About
An offensive profile built on curiosity, sharpened by method.
Self-taught, I learned offensive security by breaking systems, documenting every step, and starting over. A background in freelance development taught me how applications are built — which makes it easier to find where they break. Today I am building a pentest and red team profile, with the OSCP targeted for Q3 2026. I am looking for a first team to put it all to the test.
Discover my profile03 / Practice
Active in the field, always moving forward.
I keep progressing through regular labs, Hack The Box practice, write-ups, and projects that turn repetition into sharper offensive judgment.
0+
Machines pwned
0
Write-ups published
0
Projects
03 / Blue team awareness
Junior pentester, with a real blue-team foundation.
My direction is offensive, but I can also investigate from the defensive side. That foundation makes me more aware of what my actions leave behind, what gets detected, and how a blue team thinks.
Investigation
awareAnalyze network traffic, read artifacts, and reconstruct what happened.
Detection
awareUnderstand alerts, logs, and the signals that reveal abnormal activity.
Blue team awareness
awareThink exploitation and defense together to produce more realistic attacks.
04 / Projects
Latest projects
The two most recent public projects on the portfolio.
05 / Write-ups
Latest write-ups
Documenting my methodology, one machine at a time.
06 / Contact
Looking for a penetration tester?
I'm actively seeking my first professional role in offensive security. I bring structured methodology, solid documentation habits, and a serious passion for the craft.