Projects, platforms, certifications, and what I'm building next - the full picture of my offensive security journey.
Real engagements. Real findings. Real reports.
Full authentication bypass and admin JWT token extraction via unsanitised login query, zero resistance to payload injection.
BIP-39 seed phrase & OAuth client credentials stored in plaintext then led to full account takeover chain.
Sequential basket IDs exposed all users' cart contents - zero ownership validation, horizontal privilege escalation.
No rate limiting on login endpoint — admin password cracked on attempt 3 using a targeted brute-force sequence.
Active network pentest lab, custom Python tooling, and a red-team scenario — all coming to this page soon.
Actively practicing offensive security through real-world machine compromises, guided attack paths, and CTF challenges.
Completing structured learning paths and guided rooms across web exploitation, network security, and SOC analyst tracks. TryHackMe is where theory becomes instinct — every room is a real attack scenario with real consequences.
Tackling active machines and Sherlocks DFIR challenges with real-world exploitation techniques. HackTheBox is where you find your limits — and push past them. Machine writeups and CTF walkthroughs publishing to this portfolio soon.
Detailed writeups of TryHackMe rooms and HackTheBox machines — documenting methodology, exploit chains, and lessons learned. Publishing soon.
Industry-recognised credentials validating expertise in cybersecurity, compliance, and AI governance. Click any badge to verify on Credly.
Courses, workshops, and hands-on training spanning offensive security, cloud infrastructure, and development. Click any card to view the certificate.
The pipeline is loaded. These sections are actively being built — check back soon.
Step-by-step walkthroughs of TryHackMe rooms and HackTheBox machines — documenting exploit chains, methodology, and post-exploitation techniques.
Building NowCustom Python-based offensive and defensive tooling — recon automation, payload generators, SIEM integrations, and network scanning utilities.
In DevelopmentStructured lab environments — Active Directory attack chains, network pivoting, malware analysis sandbox walkthroughs, and detection engineering labs.
PlannedWhether it's a penetration testing engagement, a security consultation, or a collaboration — I'm ready. Let's talk.