Offensive Security learner focused on red team fundamentals, low‑level Linux, and practical exploitation.
I build tools to understand systems deeper and practice structured attack chains—from recon to privilege escalation.
- C programming → systems fundamentals, memory, Linux internals basics
- Python automation → recon tools, parsing, enumeration scripts
- Wi‑Fi attack surface → handshake capture, cracking, rogue AP basics
- Linux (Arch) → daily driver, system administration, services, permissions
- Web security basics → XSS, SQLi, IDOR, auth logic flaws
- Docker → lab environments, sandbox testing
- Networking fundamentals → ports, protocols, scanning, packet analysis
- Bash scripting → workflow automation, enumeration helpers
- Building small offensive tools (recon, enumeration, payload helpers)
- Linux system analysis & kernel exploration
- Web vulnerability testing
- Wi‑Fi & network reconnaissance
- Socket programming in C
- QUIC protocol basics
- Building recon & enumeration tooling
- Understanding Linux Security Module hooks
- Linux privilege escalation
- Buffer overflow fundamentals
- Payload crafting & obfuscation basics
- Beginner Windows + AD exploitation
- Reverse engineering (Ghidra, radare2)
- Malware development fundamentals (defensive + research context)
- Kernel‑level instrumentation
- Advanced exploit development
Exploring kernel hooks and building a structured enforcement module.
Goal: understand both enforcement and bypass patterns in the Linux kernel.
(Placeholder)