Yeshecodes: Access_Granted

Penetration Tester | CyberSecurity Researcher | Educator

MSc CompSci & Cyber | OSCP | CSTM

Whoami

I specialize in identifying vulnerabilities before the bad guys do. With a background in network security and a passion for social engineering, I help organizations harden their defenses through rigorous testing and clear, actionable reporting.

Technical_Toolkit

Infrastructure

Advanced Active Directory exploitation, BloodHound for path analysis, and pivoting with Cobalt Strike or Metasploit.

BloodHound Impacket Responder

Web Apps

Full-stack auditing using Burp Suite Professional. Specialized in IDOR, JWT bypasses, and API security (OWASP Top 10).

Burp Suite Postman SQLMap

GRC & Audit

Lead assessor for Cyber Essentials & Plus. Vulnerability management via Nessus/OpenVAS and gap analysis for ISO 27001.

Nessus IASME Qualys

Cloud Security

Security auditing for AWS/Azure environments. Configuring secure CI/CD pipelines and container hardening (Docker/K8s).

Pacu AzureAD Docker

OSINT

Deep-web reconnaissance and employee profiling for targeted Phishing/Vishing simulations (CSTM standard).

Maltego Sherlock GoPhish

MSc Research

Applied cryptography, machine learning in IDS, and formal security verification methods.

Python Cryptography R/Stata

Skills

Web Pentesting

OWASP Top 10, Burp Suite, SQLi, XSS, and API security auditing.

Network Ops

Nmap, Metasploit, Wireshark, and pivoting through Active Directory environments.

Scripting

Automating exploits with Python, Bash, and Go.