jc@kali:~$ whoami

Penetration Tester | Security Researcher

Breaking things to make them stronger. Offensive security professional focused on network penetration testing, web application security, and red team operations.

Recent Posts

View all →

My Web Application Pentest Methodology

A practical guide to my personal web application penetration testing methodology, from reconnaissance to reporting.

Web Security Methodology OWASP Bug Bounty

Featured Topics

View all →
🤖

AI/LLM Security

10 sections

A comprehensive guide to securing artificial intelligence and large language model systems — from understanding how LLMs work to attack vectors, penetration testing, red teaming, and defense strategies.

AI Security LLM Prompt Injection Red Teaming OWASP

A comprehensive guide to post-quantum cryptography — from understanding the quantum threat to NIST standards (ML-KEM, ML-DSA, SLH-DSA), lattice-based and hash-based schemes, hybrid approaches, migration strategies, and real-world implementation for the post-quantum era.

Post-Quantum Cryptography PQC Quantum Computing NIST FIPS Lattice Cryptography Cryptographic Migration
🎯

Red Teaming

16 sections

A comprehensive guide to adversary simulation and red team operations — from fundamentals and infrastructure to Active Directory attacks, cloud exploitation, stealth techniques, and purple teaming integration.

Red Teaming Adversary Simulation C2 MITRE ATT&CK Purple Teaming Offensive Security
🛰️

A comprehensive guide to satellite and space systems cybersecurity — from understanding satellite architecture and communication protocols to attack vectors, penetration testing, red teaming, and defense strategies for the final frontier.

Satellite Security Space Cybersecurity SATCOM GPS Spoofing Red Teaming

Featured Projects

View all →

Purpose-built AD environment for testing attack paths and detection rules. Multi-forest setup with realistic misconfigurations for practicing lateral movement and privilege escalation techniques.

Proxmox Windows Server PowerShell Terraform Ansible

Self-hosted CTF platform with custom challenges covering web exploitation, binary analysis, cryptography, and forensics.

Docker Python Flask PostgreSQL nginx

Python-based network vulnerability scanner that combines port scanning, service enumeration, and CVE lookup into a single automated workflow.

Python Nmap SQLite Docker REST API

About Me

I'm a penetration tester and security researcher focused on finding vulnerabilities before adversaries do. With experience spanning network infrastructure, web applications, and Active Directory environments, I help organizations understand and reduce their attack surface.

Learn more →