Projects
Certified Red Team Operator (CRTO)
I am proud to announce that I successfully passed the Certified Red Team Operator (CRTO) exam on 4th of December, 2024. This certification is a testament to my expertise in attacking and exploiting Windows enterprise environments, focusing on advanced red teaming techniques and the use of industry-standard tools like Cobalt...
Mythic C2 Framework
Currently, I am working on a project related to learning and applying the concepts of Command and Control frameworks, particularly Mythic, in executing pentesting and red team engagements. Mythic is an open-source C2 framework developed to mimic adversary activity. It's a way for the offensive security team to have...
Dante Certificate (HTB)
I am proud to have completed the Dante HTB Pro Labs certification, an advanced and immersive experience designed to simulate real-world penetration testing in a fully realistic, enterprise-level environment. During this journey, I refined my skills in network enumeration, privilege escalation, lateral movement, and Active Directory exploitation. The Dante lab's...
OffSec Wireless Professional (OSWP)
I am proud to have earned my Offensive Security Wireless Professional (OSWP) certification. This experience provided me with a deep understanding of wireless network security and hands-on expertise in attacking and defending WiFi networks. Throughout the process, I mastered techniques such as packet capture, wireless encryption cracking, and bypassing security...
OffSec Certified Professional (OSCP)
I am proud to have successfully earned my Offensive Security Certified Professional (OSCP) certification. It was an incredibly challenging yet rewarding experience that significantly enhanced my practical skills in penetration testing. Throughout the process, I gained hands-on expertise in areas such as network enumeration, vulnerability analysis, exploit development, and privilege...
Youtube Channel
I run my own YouTube channel where I demonstrate ethical hacking techniques in German, catering to a niche audience as there are very few German-language hacking tutorials available. On my channel, I showcase how to hack retired machines on platforms like Hack The Box and others, walking through each step...
HoneyPot
I'm currently using a powerful honeypot called Tpot, provided by Telecom, to expose the constant barrage of hackers attempting to infiltrate servers from all corners of the globe. A honeypot is essentially a trap I've set up to attract these malicious individuals and observe their tactics in action. By live-streaming...
ZIP domains
Zip domains are not inherently a problem. However, if you are referring to "zip" as a term used to describe certain types of domains, such as those ending with ".zip" or containing the word "zip," there are a few reasons why they can be problematic: Malicious Content: Files with the...
Certified Penetration Testing Specialist (HTB CPTS)
CertificationHTB Certified Penetration Testing Specialist (HTB CPTS) is a highly hands-on certification that assesses the candidates’ penetration testing skills. HTB Certified Penetration Testing Specialist certification holders will possess technical competency in the ethical hacking and penetration testing domains at an intermediate level. They will also be able to assess the...
Hacking Lab (VM)
Hacking LabMy secure network sandbox for practicing hacking skills and learning in a safe virtual machine environment is a custom-built lab designed to simulate real-world penetration testing scenarios. The lab includes an Active Directory (AD) environment along with intentionally vulnerable Windows and Linux machines, providing a comprehensive platform for honing offensive...
Certified Red Team Professional (CRTP)
CertificationI am proud to announce that I successfully passed the **Certified Red Team Professional (CRTP)** exam on **October 18, 2024**. This certification is a testament to my expertise in attacking and exploiting Active Directory environments, focusing on advanced red teaming techniques, including privilege escalation, lateral movement, and bypassing security controls....