Skip to content

Neofetcher/Neofetcher

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

40 Commits
 
 

Repository files navigation

Hello

I'm an offensive security practitioner focused on red teaming, penetration testing, and adversary emulation. I specialize in simulating real-world threats to identify weaknesses and improve defensive posture. Open to collaboration, knowledge sharing, and opportunities that support continued growth within the cybersecurity domain.

Projects:

  • Vulnerable Machine Exploitation Labs Exploited intentionally vulnerable machines to simulate real-world attack scenarios. Performed network enumeration and vulnerability scanning. Conducted post-exploitation steps and documented findings in structured penetration test reports. Machines exploited include: Blue, Dev, and others.
  • Active-Directory-AD-Lab-Environment This project presents a virtualized Active Directory (AD) lab environment designed for academic study, cybersecurity training, and system administration practice. The lab simulates a Windows-based domain infrastructure, including a Domain Controller, Windows clients.
  • Active Directory Lab Exploitation Simulated attacks on a vulnerable Active Directory environment, mimicking real-world internal penetration tests. Achieved domain admin privileges through privilege escalation and token impersonation techniques. Documented attack chains and mitigation strategies in detailed reports.
  • Cloud Honeypot Lab Project Simulated real-world security events using Nmap on Kali Linux. Queried and analyzed events using Elastic SIEM for threat detection.
  • Python Keylogger Developed a keylogger for educational use. Captures keystrokes, clipboard data, and system info while running stealthily in the background.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published