My Skills
🔍 Web Application Attacks
Exploitation & enumeration of real-world vulnerabilities
- OWASP Top 10: XSS (Reflected/Stored/DOM), SQLi (Error/Blind/Time-Based), LFI, RFI, SSTI, IDOR, CSRF, Open Redirects
- Advanced Bugs: Prototype pollution, web cache deception, host header injection, authentication bypasses
- Recon & Enumeration: Subdomain discovery, parameter fuzzing, endpoint hunting, JS analysis
🛠️ Tools & Automation
Custom scripts + trusted frameworks
- Recon:
Amass
,Subfinder
,httpx
,waybackurls
,GF
,Hakrawler
- Exploitation:
Burp Suite
,SQLMAP
,XSStrike
,ffuf
,dirsearch
,wfuzz
- CMS Attacks:
WPScan
, manual WP enum + plugin exploits - Custom tooling with Bash, Python, and occasional Go
🧬 Post-Exploitation & Privilege Escalation
From foothold to full control
- Linux: SUID abuse, PATH hijacking, cronjob exploitation, kernel exploits, LXC escape, file capabilities
- Windows: Token impersonation, DLL hijacking, Unquoted Service Paths, UAC bypass, misconfigured services
- Tools:
LinPEAS
,WinPEAS
,PowerUp
,Seatbelt
,SharpHound
,BloodHound
, custom scripts
🕳️ Pivoting & Lateral Movement
Tunneling through segmented networks
- Tools:
CHISEL
,SOCAT
,NETCAT
,SSH tunneling
,proxychains
,RDP pivoting
- Techniques: Port forwarding, SOCKS proxies, multi-hop chains, pivot automation via scripts
📶 Wireless Attacks
Offensive Wi-Fi tactics
- Attacks: WPA/WPA2 handshake capture, PMKID cracking, rogue AP, deauth attacks
- Tools:
WIFITE
,Aircrack-ng
,hcxdumptool
,Bettercap
,EvilAP
,Wireshark
🧪 Malware Development & Red Team TTPs
Learning offensive security from the core
- Custom droppers, obfuscated payloads, basic packers
- Evasion: AV/EDR bypass via LOLBAS, dual-use tools, staged payloads
- Tooling:
MSFVenom
,Shellter
,Nim
,C# loaders
,Invoke-Obfuscation
🧠 Environment Mastery
OS & networking fluency
- Linux: LFS experience, bash scripting, service hardening, kernel builds
- Windows: PowerShell scripting, registry abuse, GPO hunting, userland attacks
- Networking: TCP/IP deep understanding, VLANs, DHCP poisoning, port knocking setups
🎥 Community & Knowledge Sharing
Cybersecurity content creator
- Tutorials & real-world demos on YouTube
- Focus: bug bounty reports, walkthroughs, CTFs, and red team labs
🌐 Remote-First Mindset
Available for remote opportunities globally
- Ready to collaborate with blue, red, or purple teams
- Fluent in both English and Spanish (bilingual support)