Skip to main content

Portfolio

Hands-on security work, open-source projects, and continuous learning. Because real skills come from real practice.

Public Profiles

Projects & Tools

Security tools, frameworks, and automation platforms built for real-world penetration testing and cybersecurity operations.

🔒 Note: These repositories are private to protect intellectual property and proprietary methodologies. Descriptions provide an overview without revealing implementation details.

5H3LL5H0CK3R

⭐ FLAGSHIP
Active

Next-generation cybersecurity platform featuring AI-powered analysis with specialized personas, multiple interfaces (WPF, Blazor, CLI), and modular architecture. Completely standalone with zero external dependencies, designed for offline private network testing and bug bounty environments.

C#AICybersecurity PlatformModular Architecture
View Repository →

ZeroBrain

⭐ FLAGSHIP
Active

Offline offensive AI assistant and modular CLI framework for penetration testing. Go-powered, persona-driven tactical decision engine designed for autonomous tool execution and result analysis without cloud dependencies.

GoAICLIPenetration Testing
View Repository →

Skunkworks

Active

Tools and reconnaissance module providing port scanning alternatives and integration capabilities. Modular architecture with scanner, recon, and utility components designed for extensible security tooling.

PythonReconToolingModular
View Repository →

Kitsune

Active

Exploit development module focused on OPSEC-safe payload generation. Specialized in stealth payloads, reverse shells, and binary compilation with AV evasion capabilities.

NimExploit DevelopmentOPSECPayloads
View Repository →

CLI Cowboy

Active

Modular terminal-based framework for orchestrating penetration testing tools. Features TUI menus, session-based target storage, and Zellij integration for concurrent tool execution.

GoCLITUIPentest Automation
View Repository →

OmniOps

In Development

Full-stack business assistant platform combining CRM, project management, billing, and reporting capabilities. Built with ASP.NET Core backend and TypeScript frontend.

C#TypeScriptFull-StackBusiness Tools
View Repository →

Code Sample

cli-cowboy/main.go
package main

import (
    "fmt"
    "os"
    "github.com/AlecAivazis/survey/v2"
)

// Session represents a target session context
type Session struct {
    Target   string `json:"target"`
    Tools    []string `json:"tools"`
    Notes    string `json:"notes"`
}

// CLI Cowboy - Modular pentest tool orchestrator
func main() {
    var target string
    
    prompt := &survey.Input{
        Message: "Enter target:",
        Help:    "IP address or hostname to target",
    }
    
    survey.AskOne(prompt, &target)
    
    if target == "" {
        fmt.Println("[!] Target required")
        os.Exit(1)
    }
    
    // Initialize session
    session := &Session{
        Target: target,
        Tools:  []string{},
    }
    
    // Display TUI menu
    showMainMenu(session)
}

func showMainMenu(s *Session) {
    var choice string
    
    options := []string{
        "Run Nmap Scan",
        "Run Gobuster",
        "View Session",
        "Exit",
    }
    
    prompt := &survey.Select{
        Message: "Select action:",
        Options: options,
    }
    
    survey.AskOne(prompt, &choice)
    
    switch choice {
    case "Run Nmap Scan":
        executeNmap(s.Target)
    case "Run Gobuster":
        executeGobuster(s.Target)
    // ... additional handlers
    }
}

Sample code snippet from CLI Cowboy project • View repository →

Writeups & Research

Technical writeups, CTF solutions, and security research documentation.

HTB WriteupHard

HTB: Corporate Machine Writeup

Full walkthrough of the Corporate machine on Hack The Box. Covers initial foothold via exposed API, lateral movement through misconfigured AD, and privilege escalation via SeImpersonatePrivilege.

Active DirectoryAPI ExploitationPrivilege Escalation
2025-11Read →
AnalysisMedium

Analyzing a Real-World Phishing Campaign

Deep dive into a phishing campaign targeting financial institutions. Includes infrastructure analysis, kit reverse engineering, and IOC extraction.

PhishingThreat IntelOSINT
2025-10Read →
TutorialBeginner

Building a Home Lab for AD Attacks

Step-by-step guide to building a vulnerable Active Directory lab for practicing common attack techniques. Includes domain setup, attack paths, and detection strategies.

Active DirectoryLab SetupEducation
2025-09Read →
THM WriteupHard

TryHackMe: Wreath Network Walkthrough

Complete walkthrough of the Wreath network on TryHackMe. Multi-machine engagement covering pivoting, tunneling, and post-exploitation.

PivotingNetworkPost-Exploitation
2025-08Read →

More writeups available on the blog

Let's Work Together

Interested in my work or need help with a security project? I'm always open to discussing new opportunities.