- πΆοΈ Offensive Security Analyst focused on pentesting and automation
- π Bug bounty hunter on public and private platforms
- π» Developer of offensive tools using Python and Shell
- π§ͺ Creator of personal labs to study evasion, C2, and post-exploitation
- π Keylogger educacional with clean output, encrypted ZIP, and SMTP delivery
- βοΈ Recon toolkit Subdomain enumeration, port scanning, screenshots & passive/active recon automation
- 𧬠Payload builder Modular payload generator with basic AV evasion techniques for labs
- πΊ Red Team (C2 frameworks, persistence, lateral movement)
- π¦ Malware development focused on AV bypass
- π‘ Data exfiltration techniques in simulated environments
β οΈ All projects are for educational purposes and run in controlled environments.
β Never use tools without proper authorization.π§ βThe best way to defend is to understand how to attack.β