Skip to content
View daniel-ploetzl's full-sized avatar

Highlights

  • Pro

Block or report daniel-ploetzl

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
daniel-ploetzl/README.md

Daniel Plötzl

Red Team Practitioner completing the Computer Software Engineering programme at 42 Vienna (project-based, peer-to-peer learning model) with practical offensive security emphasis.

Hands-on experience with process lifecycle manipulation, session-level exploitation, endpoint simulation and detection analysis in controlled environments.

Currently preparing for Certified Red Team Professional (CRTP) certification to strengthen Active Directory exploitation capabilities and expand penetration testing credentials.

Core Areas

  • System exploitation and session control mechanisms: setsid, process groups, signal handling
  • Ephemeral execution: runtime isolation and persistence boundaries in volatile memory environments
  • X11 internals: window manager bypass, input grabbing, session takeover
  • USB HID simulation: user input emulation, endpoint testing and detection evasion

Current Focus

  • Preparing for Certified Red Team Professional (CRTP) certification
  • Penetration testing fundamentals through system-level experimentation
  • Developing offensive security labs in controlled environments

🛠️ Tech Stack

Operating Systems & Tools

Linux Windows Git

Coding

C C++ Bash

Tools & Environment

Neovim Tmux Docker VirtualBox Wireshark Nmap

📁 Selected Projects

  • 🖥️ x11-lab - X11 input grabbing, window manager bypass and session takeover
  • ⌨️ hid-lab - USB HID input simulation via embedded hardware (Raspberry Pi Pico 2)
  • ⚙️ proc-lab - Process group detachment, signal handling and lifecycle control
  • 💾 ram-workspace-lab - Runtime isolation and persistence boundary analysis in volatile memory

Pinned Loading

  1. x11-lab x11-lab Public

    Xlib program that takes full control of an X11 session from user space using standard POSIX and X11 primitives.

    C

  2. hid-lab hid-lab Public

    USB Human Interface Device (HID) simulation project for studying user input behaviour and endpoint activity detection

    C

  3. proc-lab proc-lab Public

    Bash-based lab tool for analysing Linux process lifecycle, session behaviour and runtime execution patterns

    Shell

  4. ram-workspace-lab ram-workspace-lab Public

    Execution environment relocated to memory, with explicit encrypted persistence, to analyse runtime visibility versus stored artifacts

    Shell