Red Team Practitioner completing the Computer Software Engineering programme at 42 Vienna (project-based, peer-to-peer learning model) with practical offensive security emphasis.
Hands-on experience with process lifecycle manipulation, session-level exploitation, endpoint simulation and detection analysis in controlled environments.
Currently preparing for Certified Red Team Professional (CRTP) certification to strengthen Active Directory exploitation capabilities and expand penetration testing credentials.
- System exploitation and session control mechanisms: setsid, process groups, signal handling
- Ephemeral execution: runtime isolation and persistence boundaries in volatile memory environments
- X11 internals: window manager bypass, input grabbing, session takeover
- USB HID simulation: user input emulation, endpoint testing and detection evasion
- Preparing for Certified Red Team Professional (CRTP) certification
- Penetration testing fundamentals through system-level experimentation
- Developing offensive security labs in controlled environments
- 🖥️ x11-lab - X11 input grabbing, window manager bypass and session takeover
- ⌨️ hid-lab - USB HID input simulation via embedded hardware (Raspberry Pi Pico 2)
- ⚙️ proc-lab - Process group detachment, signal handling and lifecycle control
- 💾 ram-workspace-lab - Runtime isolation and persistence boundary analysis in volatile memory

