cat0x01

cat0x01#

Red Team | Bug Hunter | Developer

I build offensive security capability that is practical, repeatable, and grounded in real attacker tradecraft. My focus is on finding how systems fail, chaining small weaknesses into impact, and turning that knowledge into tooling and better defenses.


What I Do#

  • Red Team operations and adversary emulation
  • Web and infrastructure exploitation
  • Attack path discovery, privilege escalation, and lateral movement
  • Recon and enumeration automation
  • Custom tooling for offensive workflows

How I Work#

  • Evidence first: validate every claim with hands-on testing
  • Automation where it matters: speed up recon, reduce human error
  • Signal over noise: prioritize impact, not volume
  • Continuous learning: CTFs, labs, incident reports, and field notes

Core Capabilities#

  • Web vulnerabilities and logic flaws (OWASP Top 10 + real world patterns)
  • API security, auth bypass, and session manipulation
  • Linux and Windows privilege escalation
  • Active Directory basics and lateral movement fundamentals
  • Threat modeling from an attacker perspective

Tooling and Development#

  • Python for automation and recon tooling
  • PHP and JavaScript for dashboards, labs, and custom apps
  • Bash for orchestration and workflow glue
  • MySQL for data extraction and analysis

Certifications and Badges#


Focused Projects#

  • Recon frameworks for bug bounty and red teaming
  • Enumeration automation and attack surface mapping
  • Secure lab environments for repeatable testing
  • Internal knowledge base with playbooks and checklists

Goal#

Become a high impact Red Team operator who can emulate real adversaries, bypass modern defenses, and help organizations see their true risk. I care about depth, not hype.


Notes#

Break systems to understand them. Understand systems to secure them.