[SYSTEM:INITIALIZED]Offensive & Defensive Security Specialist
Penetration Testing • Network Security • Vulnerability Analysis
About.
I am a dedicated cybersecurity professional with a background in IT support and network administration. My experience has equipped me with deep expertise in securing and managing Active Directory infrastructures, ensuring robust protection against threats.
Currently, I am honing my skills in log analysis, incident response, and the use of specialized tools like EDR, firewalls, DLP, Snort, and Wireshark. As a curious self-learner, I am constantly exploring advanced topics such as malware development, reverse engineering, memory hacking, and initial access techniques. I am particularly interested in leveraging Large Language Models (LLMs) to enhance Blue Team capabilities and strengthen defensive strategies.
I thrive on tackling new challenges and am committed to staying at the forefront of cybersecurity innovation.
Current Focus
- Log analysis and incident response workflows
- Malware development and reverse engineering techniques
- Exploring LLMs for Blue Team automation and threat detection
- Strengthening Active Directory security through advanced configurations
Experience.
Cybersecurity Specialist
TechDefense Inc.
Leading security assessments and implementing robust defensive measures for enterprise clients.
Network Security Engineer
SecureNet Solutions
Designed and maintained secure network infrastructures with a focus on threat prevention.
IT Support Specialist
Global Systems
Provided technical support and implemented security best practices across the organization.
Projects.
Neo-AI
Neo AI integrates into the Linux terminal for enhanced cybersecurity operations.
ShadeLoader
A custom loader for executing shellcode with evading techniques.
Simple Process Hollowing
Demonstration of process hollowing for shellcode execution.
Rust C2 Framework
A fully custom Command & Control (C2) framework developed entirely in Rust, designed for advanced security research. (Not yet public)
GitHub Stats
Skills.
Languages
Core Languages
- ➜Rust
My language of choice for developing high-performance and secure tools, with a focus on memory safety.
- ➜Python
Used to automate pentesting tasks and rapidly develop tools thanks to its flexibility.
- ➜C++
Ideal for projects requiring low-level control, such as malware analysis or development.
Additional Languages
- ➜PHP, Bash, PowerShell
Learning in Progress
- ➜COBOL
Currently exploring to understand legacy systems and their potential vulnerabilities.
- ➜Assembly (ASM)
Learning to deepen my skills in reverse engineering and malware development.
Favorite Tools
My preferred tools for simulating advanced attacks and testing defenses.
Ideal for automating security tests on web applications.
My choice for reverse engineering, with an intuitive and powerful interface.
Essential for quickly developing and executing exploits.
Essential for analyzing network traffic and identifying anomalies.
Perfect for testing web application vulnerabilities and intercepting requests.
Expertise Areas
Mastery of attack methodologies to test defenses (e.g., vulnerability exploitation, privilege escalation, etc.).
Designing solutions to protect systems against threats (e.g., monitoring).
Creating and testing exploits to better understand vulnerabilities.
Active search for indicators of compromise in IT environments.
Certifications.
SC-900
Completed2024-2025
AZ-900
In ProgressIn progress
Continuously expanding my knowledge and skills through professional certifications and self-directed learning.
Blog.
Technical Articles
Explore my technical articles on cybersecurity, reverse engineering, and malware development.
More technical articles coming soon...
Contact.
Get in touch
Interested in collaborating on cybersecurity projects or need expertise in penetration testing and network security? Feel free to reach out.
GitHub
github.com/Vasco0x4Interested in collaborating on cybersecurity projects or need expertise in penetration testing and network security? Feel free to reach out.
Click the button below to send me an email directly.