Portfolio
Hands-on security work, open-source projects, and continuous learning. Because real skills come from real practice.
Public Profiles
Hack The Box
@msquarellcCompany profile for creating HTB writeups and content. As we work through machines, writeups will be published on our blog and statistics will grow organically.
Noob
Rank
0
Machines
Jun 2025
Joined
TryHackMe
@msquarellcCompany profile for creating TryHackMe walkthroughs and educational content. Progress will be documented through blog posts as we complete rooms.
#1,930,991
Rank
0
Rooms
0
Badges
GitHub
@miguelmaganaSecurity tools, automation scripts, and open-source contributions. Most repositories are private to protect intellectual property.
View →
Profile
Private
Repos
Security Tools
Focus
X (Twitter)
@m_square_llcCybersecurity insights, threat updates, and security tips. Follow for updates and educational content.
View →
Profile
Security Focus
Content
Active
Status
Projects & Tools
Security tools, frameworks, and automation platforms built for real-world penetration testing and cybersecurity operations.
🔒 Note: These repositories are private to protect intellectual property and proprietary methodologies. Descriptions provide an overview without revealing implementation details.
5H3LL5H0CK3R
⭐ FLAGSHIPNext-generation cybersecurity platform featuring AI-powered analysis with specialized personas, multiple interfaces (WPF, Blazor, CLI), and modular architecture. Completely standalone with zero external dependencies, designed for offline private network testing and bug bounty environments.
ZeroBrain
⭐ FLAGSHIPOffline offensive AI assistant and modular CLI framework for penetration testing. Go-powered, persona-driven tactical decision engine designed for autonomous tool execution and result analysis without cloud dependencies.
Skunkworks
Tools and reconnaissance module providing port scanning alternatives and integration capabilities. Modular architecture with scanner, recon, and utility components designed for extensible security tooling.
Kitsune
Exploit development module focused on OPSEC-safe payload generation. Specialized in stealth payloads, reverse shells, and binary compilation with AV evasion capabilities.
CLI Cowboy
Modular terminal-based framework for orchestrating penetration testing tools. Features TUI menus, session-based target storage, and Zellij integration for concurrent tool execution.
OmniOps
Full-stack business assistant platform combining CRM, project management, billing, and reporting capabilities. Built with ASP.NET Core backend and TypeScript frontend.
Code Sample
package main
import (
"fmt"
"os"
"github.com/AlecAivazis/survey/v2"
)
// Session represents a target session context
type Session struct {
Target string `json:"target"`
Tools []string `json:"tools"`
Notes string `json:"notes"`
}
// CLI Cowboy - Modular pentest tool orchestrator
func main() {
var target string
prompt := &survey.Input{
Message: "Enter target:",
Help: "IP address or hostname to target",
}
survey.AskOne(prompt, &target)
if target == "" {
fmt.Println("[!] Target required")
os.Exit(1)
}
// Initialize session
session := &Session{
Target: target,
Tools: []string{},
}
// Display TUI menu
showMainMenu(session)
}
func showMainMenu(s *Session) {
var choice string
options := []string{
"Run Nmap Scan",
"Run Gobuster",
"View Session",
"Exit",
}
prompt := &survey.Select{
Message: "Select action:",
Options: options,
}
survey.AskOne(prompt, &choice)
switch choice {
case "Run Nmap Scan":
executeNmap(s.Target)
case "Run Gobuster":
executeGobuster(s.Target)
// ... additional handlers
}
}Sample code snippet from CLI Cowboy project • View repository →
Writeups & Research
Technical writeups, CTF solutions, and security research documentation.
HTB: Corporate Machine Writeup
Full walkthrough of the Corporate machine on Hack The Box. Covers initial foothold via exposed API, lateral movement through misconfigured AD, and privilege escalation via SeImpersonatePrivilege.
Analyzing a Real-World Phishing Campaign
Deep dive into a phishing campaign targeting financial institutions. Includes infrastructure analysis, kit reverse engineering, and IOC extraction.
Building a Home Lab for AD Attacks
Step-by-step guide to building a vulnerable Active Directory lab for practicing common attack techniques. Includes domain setup, attack paths, and detection strategies.
TryHackMe: Wreath Network Walkthrough
Complete walkthrough of the Wreath network on TryHackMe. Multi-machine engagement covering pivoting, tunneling, and post-exploitation.
More writeups available on the blog
Let's Work Together
Interested in my work or need help with a security project? I'm always open to discussing new opportunities.