Offensive Security Specialist
I focus on hands-on offensive security and practical penetration testing. Most of my time is spent breaking systems in controlled lab environments so I can understand how they fail and how to make them more secure.
I work across Linux and Windows machines, web applications, internal networks, and identity-based environments, practicing real-world techniques like privilege escalation, lateral movement, and post-exploitation. I document what I learn through tools, scripts, and writeups that I share publicly.
Everything here is built for learning, research, and improving security in a responsible and ethical way.
- End-to-end offensive security assessments across Linux and Windows environments
- Web application exploitation and internal network compromise
- Active Directory attack paths, privilege escalation, and lateral movement
- Wireless security testing and internal threat simulation
- Secure development with focus on attack surface reduction
- Custom tooling for reconnaissance, exploitation, and automation
- 👉 🧰 pwnhub → My main repository containing offensive security tools, scripts, and lab writeups
- 🛡️ netlabguard → Enterprise-grade Linux network auditing toolkit with ARP discovery, MITM simulation, and device containment for authorized security testing.
- 🚀 semok → Multi-threaded network stress simulation tool built for controlled testing and research. Supports proxy chaining, header manipulation, and response analysis.
- 🌐 dnsinfo → DNS enumeration and analysis utility used to map exposed records and identify external attack surfaces.
- 🐚 (More coming soon… because the lab never sleeps)
- 🧠 HTB CDNio (Web Cache Poisoning)
Analysis of a chained cache poisoning vulnerability involving unsafe CDN caching, regex route bypass, and JWT worker desynchronization. Includes exploit automation and defensive remediation notes.
Operate quietly. Measure impact. Leave systems stronger than you found them. And always have a backup… or two. 😉
- Advanced Active Directory abuse paths and delegation scenarios
- Covert command-and-control concepts and payload delivery
- Deep kernel-level Linux hardening
- Stealth-oriented Wi-Fi post-exploitation workflows
- 🌐 Website: https://jusot99.github.io
- 💻 Join me on HTB Academy and level up your hacking skills: https://referral.hackthebox.com/mzBAiBw


