C:\DOSec\projects — DIR.EXE _
C:\DOSec> cd projects && dir

PROJECTS.DIR

──────────────────────────────────────────────────

// All engagements anonymized. Client details withheld per NDA. Objectives, methods, and outcomes are described at a technical level.

  • [ OP-PHANTOM — Red Team Engagement ]
    Full-scope red team operation against a regional financial institution. Initial access via spearphishing → lateral movement through AD → domain compromise in 72h. Delivered full kill chain report and remediation roadmap.
    Red Team AD Exploitation Phishing
  • [ OP-CLOAKNET — OSINT Investigation ]
    Intelligence gathering on a threat actor targeting a multinational corporation. Mapped infrastructure, attributed aliases across dark web forums, and delivered a threat actor profile with IOCs.
    OSINT Threat Intel Dark Web
  • [ OP-IRONVEIL — Physical + Digital Red Team ]
    Combined physical social engineering and network intrusion exercise. Gained physical access to a restricted operations room; demonstrated ability to pivot to OT network from IT zone.
    Physical SE OT/ICS Red Team
  • [ TOOL — ReconDOS ]
    Python-based OSINT automation tool for initial reconnaissance. Aggregates data from multiple public sources (WHOIS, Shodan, certificate transparency, LinkedIn scraping) into a structured report.
    Python OSINT Open Source
  • [ CTF — HackTheBox / TryHackMe Top Finishes ]
    Regular participant in HackTheBox and TryHackMe platforms. Solved 80+ machines across Active Directory, web exploitation, forensics, and reverse engineering categories.
    HTB THM CTF