Skip to content
View Adrilaw's full-sized avatar
πŸ’­
Working
πŸ’­
Working

Block or report Adrilaw

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Adrilaw/README.md

⚑ Adrien Dodin | Adrilaw | KidPentester⚑

Red Team Operator β€’ Hardware Hacker β€’ Security Researcher


🧬 OPERATOR IDENTITY

Role Status Specialty

Professional Identity β†’ Adrilaw

Red Team Persona β†’ KidPentester

Cybersecurity Analyst

Offensive Security Specialist in development

Kernel builder β€’ Tool developer β€’ Lab architect


🧠 ABOUT ME

Mindset

I simulate real-world cyber attacks, build offensive infrastructure, and engineer controlled environments to study how modern adversaries operate inside enterprise systems.

Core disciplines:

βœ” Penetration testing methodology

βœ” Hardware exploitation

βœ” Command & Control infrastructure

βœ” Detection evasion

βœ” Privilege escalation

βœ” Attack path simulation

Mission β†’ Become an elite enterprise red team specialist.


πŸ„ LIFE PHILOSOPHY

Surf

Surfer mentality applied to red teaming:

Flow Timing Precision Patience Control under pressure

Attack execution requires the same awareness as reading waves.


πŸ’Ό PROFESSIONAL EXPERIENCE

Work

Security consulting environment exposure:

βœ” penetration testing reports

βœ” vulnerability analysis

βœ” risk frameworks (ISO 27001 / NIST)

βœ” enterprise security operations

βœ” red team methodology observation

Career path β†’ Red Team Specialist.


πŸ”§ MAJOR TECHNICAL PROJECTS

Build

βœ” Custom Kali NetHunter kernel (Samsung J8)

βœ” HID / BadUSB attack payloads

βœ” Offensive automation tools

βœ” Command & Control experiments

βœ” Red team simulation labs

βœ” Security research environments


πŸ›  TECH STACK

πŸ’» Systems

Linux Windows Parrot OS

βš™οΈ Languages

Python PowerShell Bash

πŸ“š Learning

JavaScript SQL


πŸ”¬ SECURITY RESEARCH LABS

Lab

Simulating full attack lifecycle:

Initial access

Privilege escalation

Lateral movement

Persistence

C2 communication

Detection evasion

Physical compromise

All testing conducted ethically.


🧭 RED TEAM MASTER ROADMAP

Roadmap

2026 β†’ Foundations + eJPT

2027 β†’ Pentester + PNPT + CRTP

2028 β†’ Red Team Operator + CRTO

2029 β†’ Advanced Operator + OSCP + MSc

2030 β†’ Senior Red Team Specialist

Target β†’ Enterprise adversary simulation expert.


πŸ›‘οΈ Red Team Roadmap (Progress Tracker)

Year Milestone / Goal Status
2026 OTHM Diploma + BDO Junior Analyst ⏳ Pending
2026 eJPT v2 Certification ⏳ Pending
2026 HTB CPTS Path ⏳ Pending
2027 BSc Year 1 + Junior Pentester at BDO ⏳ Pending
2027 PNPT Certification ⏳ Pending
2027 CRTP Certification ⏳ Pending
2028 Junior Red Teamer (BDO) ⏳ Pending
2028 CRTO Certification ⏳ Pending
2028 Azure Fundamentals (AZ-900) ⏳ Pending
2029 MSc Enrollment + Advanced Operator ⏳ Pending
2029 OSCP Certification ⏳ Pending
2030 Senior Red Teamer + CRTE / OSCE3 ⏳ Pending

🎯 OPERATOR CAPABILITY TARGET

Goal

βœ” Hybrid AD / Cloud compromise

βœ” Stealth long-term campaigns

βœ” Custom offensive frameworks

βœ” Detection engineering awareness

βœ” Purple team operations

βœ” Technical leadership


πŸ“Š OPERATOR METRICS


🀝 COLLABORATION

Collab

Offensive tooling Red team labs Hardware hacking Adversary simulation frameworks


πŸ’¬ ASK ME ABOUT

Pentesting Kali NetHunter Kernel building HID attacks Red team methodology Security automation


⚠️ ETHICAL DIRECTIVE

Ethics

Education Research Authorized testing Controlled environments

Unauthorized activity is not supported.


⭐ Follow the evolution of a future elite red team operator.

Popular repositories Loading

  1. MedusaPhisher MedusaPhisher Public

    Phishing tool script which generate phishing websites with a link to send to victim, the link genrated comes together with a QR code.Medusa Phisher helps pentesters to evaluate how well employees r…

    HTML 138 40

  2. OdinV4 OdinV4 Public

    OFFICIAL Samsung Odin v4 1.2.1 - For Linux

    133 13

  3. DuckHunter_HID_Scripts DuckHunter_HID_Scripts Public

    Ready made ducky scripts to use in nethunter Duckhunter HID attack to perform bad usb attack right at your fingertips.

    11 1

  4. ELIANA-Remote-Access-Trojan ELIANA-Remote-Access-Trojan Public

    An AI generated lightweight Python + Telegram C2 tool built for authorized VAPT engagements . It allows security testers with proper permission to remotely run approved commands, gather system inf…

    Python 7 1

  5. Digispark_DuckyScripts Digispark_DuckyScripts Public

    Transform your Digispark into a powerful keystroke injection tool! This repo provides scripts and guides for using your Digispark as a Rubber Ducky device, perfect for automation and security testi…

    C++ 5

  6. aarch64-linux-android-4.9-toolchain aarch64-linux-android-4.9-toolchain Public

    Forked from KudProject/aarch64-linux-android-4.9

    Using the AArch64 GCC 4.9 toolchain from Android's master branch for 64-bit ARM builds, with deprecation warnings turned off and build delays removed to speed up the compilation process.

    C 3 1