-
[ OP-PHANTOM — Red Team Engagement ]
2024 | Financial Sector | Latin America
Full-scope red team operation against a regional financial institution.
Initial access via spearphishing → lateral movement through AD →
domain compromise in 72h. Delivered full kill chain report and
remediation roadmap.
Red Team
AD Exploitation
Phishing
-
[ OP-CLOAKNET — OSINT Investigation ]
2024 | Corporate Client | Remote
Intelligence gathering on a threat actor targeting a multinational
corporation. Mapped infrastructure, attributed aliases across dark web
forums, and delivered a threat actor profile with IOCs.
OSINT
Threat Intel
Dark Web
-
[ OP-IRONVEIL — Physical + Digital Red Team ]
2023 | Critical Infrastructure | Argentina
Combined physical social engineering and network intrusion exercise.
Gained physical access to a restricted operations room; demonstrated
ability to pivot to OT network from IT zone.
Physical SE
OT/ICS
Red Team
-
[ TOOL — ReconDOS ]
2024 | Open Source | GitHub
Python-based OSINT automation tool for initial reconnaissance.
Aggregates data from multiple public sources (WHOIS, Shodan,
certificate transparency, LinkedIn scraping) into a structured report.
Python
OSINT
Open Source
-
[ CTF — HackTheBox / TryHackMe Top Finishes ]
2022–2024 | Competitive
Regular participant in HackTheBox and TryHackMe platforms.
Solved 80+ machines across Active Directory, web exploitation,
forensics, and reverse engineering categories.
HTB
THM
CTF