Skip to content
View Neofetcher's full-sized avatar
🖊️
🖊️

Block or report Neofetcher

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Neofetcher/README.md

Hello

I'm an offensive security practitioner focused on red teaming, penetration testing, and adversary emulation. I specialize in simulating real-world threats to identify weaknesses and improve defensive posture. Open to collaboration, knowledge sharing, and opportunities that support continued growth within the cybersecurity domain.

Projects:

  • Vulnerable Machine Exploitation Labs Exploited intentionally vulnerable machines to simulate real-world attack scenarios. Performed network enumeration and vulnerability scanning. Conducted post-exploitation steps and documented findings in structured penetration test reports. Machines exploited include: Blue, Dev, and others.
  • Active-Directory-AD-Lab-Environment This project presents a virtualized Active Directory (AD) lab environment designed for academic study, cybersecurity training, and system administration practice. The lab simulates a Windows-based domain infrastructure, including a Domain Controller, Windows clients.
  • Active Directory Lab Exploitation Simulated attacks on a vulnerable Active Directory environment, mimicking real-world internal penetration tests. Achieved domain admin privileges through privilege escalation and token impersonation techniques. Documented attack chains and mitigation strategies in detailed reports.
  • Cloud Honeypot Lab Project Simulated real-world security events using Nmap on Kali Linux. Queried and analyzed events using Elastic SIEM for threat detection.
  • Python Keylogger Developed a keylogger for educational use. Captures keystrokes, clipboard data, and system info while running stealthily in the background.

Pinned Loading

  1. Vulnerable-Machine-Exploitation-Labs Vulnerable-Machine-Exploitation-Labs Public

    Exploited intentionally vulnerable machines to simulate real-world attack scenarios.

  2. Active-Directory-Lab-Exploitation Active-Directory-Lab-Exploitation Public

    Simulated attacks on a vulnerable Active Directory environment, mimicking real-world internal penetration tests. Achieved domain admin privileges through privilege escalation and token impersonatio…

  3. Active-Directory-AD-Lab-Environment Active-Directory-AD-Lab-Environment Public

    This project presents a virtualized Active Directory (AD) lab environment designed for academic study, cybersecurity training, and system administration practice. The lab simulates a Windows-based …

  4. Python-Keylogger Python-Keylogger Public

    Developed a keylogger for educational use. Captures keystrokes, clipboard data, and system info while running stealthily in the background.

    Python