Offensive Security
& Technical Audits
I find the vulnerabilities before the real attackers do.
Comprehensive testing for Humans, AI, Applications, and Infrastructure.
01 // Human Layer
Phishing Assessment
I craft an appropriate phishing campaign to target your employees. You will get a report of user actions and recommendations. A fast and clear assessment of your current security posture.
02 // Artificial Intelligence
AI / LLM Red Teaming
Specific tests for internal AI chatbots. I test for "Jailbreaking" (forcing the AI to say harmful things) and data leakage (extracting secrets).
03 // Application & API Security
Traditional Web Applications
The solution for standard web apps and monoliths. I simulate a real-world attack on your application logic to prevent data breaches, XSS, and SQL injection flaws. *Note: For major codebases, consider my "Shift Left" Secure SDLC service.
GraphQL & API Testing
Modern apps rely on complex API chains. I manually test for Broken Object Level Authorization (BOLA), excessive data exposure, and injection flaws.
04 // Infrastructure & Network
External Network PenTest
Assess what the internet sees. I map your digital footprint and attempt to breach your perimeter. Essential for companies with unknown asset sprawl.
Active Directory Health Check
90% of ransomware spreads via AD
Attack Vector Logic:
Once attackers compromise a single endpoint, they leverage Lateral
Movement (pass-the-hash, Kerberoasting) within AD to escalate
privileges to Domain Admin.
Source: Mandiant / Microsoft Defense
Reports.
.
I audit your Domain Controllers for "Kerberoasting," weak service accounts, and legacy
protocols.
How We Collaborate
Discovery & Scoping
We define ideas and expected results via a scoping call. We establish the "Rules of Engagement" and decide between Blackbox or Whitebox testing.
Proposal & Contract
I propose a solution via email. Once agreed, we sign a framework contract (MSA/SOW) defining timing, inputs, and outputs.
Execution Phase
I execute the tests within the agreed window. Focused deep work with updates provided only on critical findings (business stoppers).
Report & Debrief
You receive the final report. We hold one final session to discuss findings and propose next steps. The project is delivered.
Optional: Long-Term Retainer
Security doesn't stop at the report. We can establish a minimal retainer to ensure I remain available for ad-hoc advice, re-tests, or strategic guidance throughout the year.