
Cybersecurity professional specializing in ethical hacking, penetration testing, and vulnerability analysis with 3 years of experience in bug bounty programs and web/API security assessments. Currently pursuing Offensive Security Certified Professional (OSCP) certification to enhance skills in advanced attack simulations. Committed to continuous learning through hands-on labs, Capture The Flag (CTF) challenges, and personal projects. Focused on delivering proactive security assessments to strengthen organizational defenses.
Offensive Security Certified Professional (OSCP) - OffSec (In Progress)
API Penetration Testing - APIsec University Novemeber, 2025
Certified Red Team Professional (CRTP) - Altered Security October, 2025
Active Directory Home Lab
• Designed and deployed a custom Windows Active Directory environment with multiple hosts,
including Domain Controller (DC), client machines, and vulnerable services to simulate enterprise
networks.
• Exploited misconfigurations such as Kerberoasting, AS-REP roasting, Pass-the-Hash,
LLMNR/NBT-NS spoofing, Unconstrained Delegation.
• Used tools such as BloodHound, Mimikatz, NetExec, Rubeus, SharpHound, and PowerView to
enumerate and exploit AD.