Albion | Offensive Security Specialist
Welcome to my cybersecurity portfolio.
This page showcases my practical experience in penetration testing, network exploitation, and red team operations.
Every project, writeup, and tool here reflects my focus on mastering real-world attack paths, understanding system weaknesses, and developing defensive awareness through offensive practice.
I document each lab and engagement with a clear methodology โ from reconnaissance to post-exploitation โ emphasizing precision, ethics, and continuous learning.
๐ง About Me
Ethical hacker and security strategist focused on red-team methodologies, web-app security, and network exploitation.
I approach each engagement with a clear process: reconnaissance โ enumeration โ exploitation โ privilege escalation โ post-exploitation โ reporting.
Precision, ethics, and continuous improvement define my work.
โ๏ธ Hands-On Labs & CTFs
TryHackMe
- Blue โ SMB enum โ MS17-010 exploit โ system privilege escalation โ patch validation
- Kenobi โ FTP enum โ NFS mount โ local priv esc via SUID binary
Hack The Box
- Lame โ FTP + Samba exploitation โ root with Metasploit โ cleanup & reporting
- Shocker โ Shellshock vulnerability โ command injection โ privilege escalation
๐งฐ Tools & Scripts
- ReconX ( Python ) โ automates port scanning and subdomain discovery with Nmap + Gobuster
- EnumBuddy (Bash) โ quick SMB/LDAP enumeration workflow
- PayloadLab โ test bench for custom reverse shell payloads
All source code is available on GitHub โ tools folder
๐งพ Certifications & Training
- Google Cybersecurity Professional Certificate
- TryHackMe - Red Teaming
- TryHackMe - Web Application Pentesting
- TryHackMe - Web Fundamentals
- TryHackMe - Jr Penetration Tester
- PNPT โ Practical Network Penetration Tester (target 2025)
- OSCP โ Offensive Security Certified Professional (future goal)
๐ Technical Stack
Kali Linux โข Parrot OS โข Burp Suite โข Metasploit โข Wireshark โข Nmap โข Hydra โข Python โข Bash โข Active Directory โข Windows Server โข Linux
๐ธ Gallery / Proof
๐ซ Connect
LinkedIn | TryHackMe | Hack The Box | GitHub
Ethical Disclaimer
All projects are conducted within controlled, authorized environments for educational purposes only.
Never use these techniques against systems without explicit permission.