Curious builder with over 15 years of experience in technology, security, and connectivity. I specialize in crafting resilient infrastructure, automating complex workflows, and pushing the boundaries of open-source innovation. From system architecture to hardware tinkering, I turn curiosity into practical tools—and chaos into clean code.
👋 Hey, I'm Foresta
🔧 Automation enthusiast • 💬 Ethical leader • 🐍 Python practitioner • 🐺 Furry and wolf appreciator
📦 I build tools that bring clarity to digital spaces—automating Telegram or streamlining Windows and Linux workflows.
🧠 I thrive on solving problems with clean logic, clever integrations, and human-friendly design.
🕵️♂️ I create OSINT pipelines and reconnaissance tools to uncover insights beneath the surface.
🔌 I experiment with Raspberry Pi, Arduino, and nRF modules—merging modular hardware with efficient firmware builds.
🧰 GPIO integrations and mesh networking are my playgrounds.
🧵 I design and print functional enclosures and mods, layering STL precision with purpose.
⚡ ADHD-fueled creativity drives my momentum—from hyperfocus sprints to inspired debugging.
🧠💙 I'm a mental health advocate committed to transparency, accessibility, and tech-powered support.
🌱 I currently balance security and director roles while growing as a leader through collaboration.
🎓 Lifelong volunteer rooted in service, purpose, and community.
📬 Open to connecting, collaborating, or just organizing chaos with code.
🐾 When I'm not building or automating, I'm chasing rabbit holes, printing pixels, or howling at the moon.
💡 Wired by curiosity. Powered by caffeine. Debugged by nature.
✨ And if you're wondering what I'm working on next... same. Probably whatever shiny fixation just hijacked my neurons.
“You never change things by fighting the existing reality. To change something, build a new model that makes the existing model obsolete.”
— Buckminster Fuller
- Languages: Python, PowerShell, Bash, JavaScript (occasional), Arduino/C
- Platforms: Windows/Linux hybrid, Docker, Telegram, GitHub/GitLab, Hyper-V, VirtualBox
- Security Tools: Nmap, SpiderFoot, Wireshark, Metasploit, Burp Suite, Maltego
- Networking: pfSense, tcpdump, Netcat, VPNs, OSPF/BGP, nRF52840, SX127x modules
- Compliance Frameworks: SOX, NYDFS, SEC Cyber Rules, CMMC, DORA (actively researching)
- Hardware: ESP32, Arduino, nRF boards, soldering/debugging gear, 3D printing
- Automation: Python scripts, PowerShell modules, Telegram bots, cron/task schedulers
-
Low-Power Radio Beacon
Field-deployable tracking module using LoRa + GPS, tuned for stealth geocaching and RF experimentation -
Telegram Utility Suite
Scalable bot system for alerting, chat moderation, file delivery, and remote ops -
Recon Operator Toolkit
OSINT tools, metadata harvesters, and perimeter analysis scripts used for infosec and CTF prep -
3D Printable RF Enclosures
STL files optimized for thermal control, signal exposure, and rapid prototyping across RF tools
With a deep foundation in networking, system administration, and security operations, I thrive at the intersection of scalable infrastructure, compliance frameworks, and innovative tooling.
- 🖧 Network engineer managing hybrid Windows/Linux systems and enterprise connectivity
- 🏫 Former technology department director leading district-wide IT strategy and operations
- 🔐 Maintaining ongoing training for a future SOC role while actively applying past red team and penetration testing experience—including participation in CTF events—to strengthen defensive strategies and incident readiness
- 📋 Formal training in SOX, NYDFS cybersecurity regulation, SEC disclosure rules, and CMMC compliance
- 📖 Actively researching DORA for evolving operational resilience frameworks
- 🔑 Leveraged platforms like Vanafi for certificate lifecycle and granular access control
- 🔄 Deployed automation using PowerShell, Python, and Linux scripting across enterprise environments
- 🧩 Engineered identity/auth controls, VPNs, DNS layers, and endpoint hardening protocols
- 🌐 Managed telecom, RF infrastructure, and site-to-site networks spanning diverse teams
- 🧠 Advocate for usable security—bridging precise systems design with human-centered approaches
- PowerShell, Python, Bash, Windows Task Scheduler, cron
- Nmap, Wireshark, Burp Suite, SpiderFoot, Maltego, Metasploit, John the Ripper
- Certificate & access control via Vanafi
- Familiarity with SOX, NYDFS, SEC, CMMC, DORA
- OSPF, BGP, VLAN, VPN, tcpdump, Netcat, pfSense, UFW, nRF52840, SX127x
- Windows/Linux, Hyper-V, VirtualBox, Docker, GitHub/GitLab, Telegram bots
- ESP32, Arduino, nRF chips, STL optimization, soldering, breadboarding
- Windows performance tweaks, input macros
- Reverse engineering tools, Python-based automation for games
Honestly? Whatever shiny side quest grabs my brain next.
Could be building a low-power radio beacon, mapping obscure repeaters, or debugging my toaster.
🦾 If that thing boots into a head-up display and starts chirping at me, I’m just calling it a Protogen and giving it any old RAM I have laying around.