ACCESS GRANTED
Offensive Security Operations

CyberReaper

// Identify. Compromise. Report.

Scroll
// whoami

About

[PLACEHOLDER
- Your Photo -]
STATUS: AVAILABLE FOR ENGAGEMENTS

Offensive security professional specializing in penetration testing, red team operations, and adversary simulation. Focused on identifying critical vulnerabilities in enterprise infrastructure before threat actors do.

Background in network security, exploit development, and operational security. Methodical approach to assessments with documented, reproducible findings and actionable remediation guidance.

0+
Years Experience
0+
Engagements Completed
0+
Tools Developed
0+
Vulnerabilities Identified
Python90%
Bash / Shell Scripting85%
Network Pentesting88%
Web Pentesting92%
OPSEC80%
Reverse Engineering75%
Malware Analysis70%
Social Engineering82%
// cat /etc/tools.conf

Arsenal

>

Offensive Tooling

Metasploit
Exploitation framework
Burp Suite
Web vulnerability scanner and proxy
Nmap
Network discovery and security auditing
Wireshark
Network protocol analyzer
Hydra
Credential brute-force engine
SQLmap
Automated SQL injection tool
Aircrack-ng
Wireless network security suite
>

OPSEC Infrastructure

Tor
Anonymous communication network
WireGuard
Encrypted tunneling protocol
Tails OS
Amnesic live operating system
Signal
End-to-end encrypted messaging
GPG / PGP
Asymmetric encryption and signing
>

Forensics and RE

Autopsy
Digital forensics platform
Volatility
Memory forensics framework
FTK Imager
Forensic disk imaging
YARA
Malware classification rules
Ghidra
Binary reverse engineering framework
// cat /var/shop/catalog

Shop

Loading products...
// cat /var/log/training.log

Training

~/training/pentest

Offensive Security Path

TryHackMe

Structured offensive security training covering enumeration, exploitation, and post-exploitation techniques.

[DONE] Completed
~/training/webapp

Web Application Security

HackTheBox Academy

Advanced web application assessment methodology including XSS, SQLi, SSRF, and authentication bypass.

[ACTIVE] In Progress -- 85%
~/training/malware

Malware Analysis Fundamentals

Udemy

Static and dynamic analysis of real-world malware samples, threat artifacts, and behavioral indicators.

[DONE] Completed
~/training/redteam

Red Team Operations

TryHackMe

Command and control frameworks, defense evasion, and adversary simulation methodology.

[ACTIVE] In Progress -- 70%
~/training/network

Network Penetration Testing

HackTheBox Academy

Active Directory compromise, lateral movement, pivoting, and protocol exploitation.

[DONE] Completed
~/training/opsec

Operational Security

Self-Study

OPSEC principles, identity segregation, and attribution avoidance for red team operators.

[ACTIVE] In Progress -- 90%
// gpg --verify credentials.sig

Certifications

VERIFIED
[OSCP]

OSCP

Offensive Security

Offensive Security Certified Professional -- hands-on penetration testing certification.

VERIFIED
[CEH]

CEH

EC-Council

Certified Ethical Hacker -- comprehensive ethical hacking methodology.

VERIFIED
[CompTIA Security+]

CompTIA Security+

CompTIA

Foundational cybersecurity certification covering threats, architecture, and operations.

VERIFIED
[CRTP]

CRTP

Pentester Academy

Certified Red Team Professional -- Active Directory attack and defense.

VERIFIED
[eWPT]

eWPT

eLearnSecurity

Web Application Penetration Tester -- advanced web security assessment.

VERIFIED
[GPEN]

GPEN

GIAC / SANS

GIAC Penetration Tester -- enterprise-grade penetration testing expertise.

// cat /proc/devices

Hardware Lab

Field-grade hardware knowledge separates operators from script runners. Each guide links to an external resource covering hands-on configuration, deployment methodology, and operational considerations.

~/hardware/raspberry-pi
Raspberry Pi
Intermediate

Raspberry Pi as a Penetration Testing Dropbox

Configure a Raspberry Pi as a covert network implant for remote access during physical engagements.

READ EXTERNAL GUIDE
~/hardware/raspberry-pi
Raspberry Pi
Beginner

Building a Portable Hacking Station with Pi

Set up Kali Linux on Raspberry Pi with external antennas and portable power for field operations.

READ EXTERNAL GUIDE
~/hardware/wifi-adapters
WiFi Adapters
Beginner

WiFi Adapter Selection for Wireless Pentesting

Choosing the right chipset for monitor mode and packet injection. Covers Atheros, Realtek, and Ralink drivers.

READ EXTERNAL GUIDE
~/hardware/wifi-adapters
WiFi Adapters
Advanced

Evil Twin and Rogue AP Attacks with WiFi Adapters

Deploying rogue access points for credential harvesting and MitM attacks using hostapd and dnsmasq.

READ EXTERNAL GUIDE
~/hardware/wifi-adapters
WiFi Adapters
Intermediate

Wardriving and Wireless Reconnaissance

Passive wireless network mapping using Kismet, GPS modules, and directional antennas.

READ EXTERNAL GUIDE
~/hardware/microcontrollers
Microcontrollers
Intermediate

ESP32/ESP8266 for WiFi Deauthentication

Programming microcontrollers for WiFi deauth attacks, beacon flooding, and network disruption testing.

READ EXTERNAL GUIDE
~/hardware/usb-attacks
USB Attacks
Beginner

Rubber Ducky and BadUSB Payloads

Creating HID injection payloads for USB attack vectors using programmable keystroke devices.

READ EXTERNAL GUIDE
~/hardware/multi-tool
Multi-Tool
Intermediate

Flipper Zero for Physical Security Testing

Using Flipper Zero for RFID cloning, sub-GHz analysis, IR replay, and NFC emulation in security assessments.

READ EXTERNAL GUIDE
~/hardware/radio
Radio
Advanced

SDR (Software Defined Radio) for Signal Analysis

Intercepting and analyzing radio signals using RTL-SDR dongles for RF security assessments.

READ EXTERNAL GUIDE
// nc -lvp 4444

Contact

Initiate Contact

Available for penetration testing engagements, red team assessments, and security consulting. Use the form or direct channels below.

contact@cyberreaper.team
contact@cyberreaper.team