About
I’ve spent the last 15 years working in offensive security, with a strong focus on Windows research and exploitation, red teaming, and developing training labs. I also delivered live training sessions to help others build their skills. Currently, I split my time between working as a red teamer at Mantodea Security and creating lab environments at Vulnlab.
Outside of security, I love exploring Japanese language and culture.
Certifications
- Offensive Security Exploitation Expert (OSEE)
- Offensive Security Exploit Developer (OSED)
- Certified Red Team Lead (CRTL)
- Certified Red Team Operator (CRTO)
- Offensive Security Experienced Penetration Tester (OSEP)
- Offensive Security Web Expert (OSWE)
- Offensive Security Certified Expert (OSCE)
- Offensive Security Certified Professional (OSCP)
- Certified Information Systems Security Professional (CISSP)
Trainings
- 2024 - Modern Initial Access and Evasion Tactics @ mgeeky
- 2023 - Linux Kernel Exploitation @ OffensiveCon by Andrey Konovalov
- 2023 - Azure AD Security @ RomHack by Dirk-jan Mollema
- 2023 - Red Team Operator: Malware Development Advanced @ Sektor7
- 2022 - Red Team Lead (CRTO2) @ Zero-Point Security
- 2022 - Windows Internals @ Pavel Yosifovich
- 2022 - Advanced Windows Exploitation @ OffSec
- 2022 - Malware Development Intermediate @ Sektor7
- 2021 - Windows User Mode Exploit Development @ OffSec
- 2021 - Red Team Operator (CRTO) @ Zero-Point Security
- 2020 - Deep Learning Specialization by Andrew Ng @ Coursera
- 2019 - SAP Cyber-Security for IT Security Practitioners @ 44Con
- 2019 - SANS660 – Advanced Penetration Testing, Exploit Writing, and Ethical Hacking
- 2019 - SANS760 – Advanced Exploit Development for Penetration Testers
- 2018 - Advanced Software Exploitation @ Ptrace Security
- 2018 - Vulnerability Discovery and Triage Automation @ OffensiveCon
- 2015 - Reverse Engineering with IDA Pro @ BlackHat EU
- 2015 - Windows & Linux Kernel Debugging @ Linux Hotel