Skip to content
View reatva's full-sized avatar

Block or report reatva

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
reatva/README.md

Hi , I'm Adrian Reategui

Who am I?

⚡ OSCP/OSCP+ Certified Professional
🔭 CWES/CBBH
✏️ Self taugh Cybersecurity student: Red and Blue team
💻 CTF player (HacktTheBox & ProvingGrounds)
📚 Constantly learning to keep developing my skills
🤔 I’m currently open for: An Intern or a new job opportunity, this is MY RESUME.

Certificates

Contact me

Technologies

Projects

Vulnerable Active Directory Lab

Custom vulnerable ACtive Directory Environment

A professionally structured Active Directory (AD) lab environment designed for hands-on learning and security testing. This lab simulates common real-world misconfigurations and vulnerabilities found in enterprise Windows domains, making it ideal for red team training, blue team defense, and purple team analysis.


Weaponized Installer Lab

Weaponized Installer Lab

This Project simulates a read team scenario where a legitimate installer is modified to carry a stealth payload. The goal is to demonstrate payload delivery via social engineering, without raising antivirus alarms. This lab is ideal for red team training, blue team defense, and purple team analysis.


Vulnerability-Management-Lab

Vulnerability Management Lab

Vulnerability Management Lab is a hands-on project that simulates a real-world vulnerability management workflow within a Windows domain environment. Utilizing open-source tools and manual patching techniques, this lab demonstrates the process of identifying, prioritizing, remediating, and validating vulnerabilities.


Threat Hunting & Incident Response Lab

Weaponized Installer Lab

A structured Threat Hunting and Incident Response (IR) lab designed for hands‑on learning with Microsoft Sentinel and Defender for Endpoint. This lab simulates realistic detection, investigation, and response workflows against common attacker TTPs.


Popular repositories Loading

  1. reatva.github.io reatva.github.io Public

    Professional web page/blog

    Astro

  2. reatva reatva Public

  3. CS-Cart-1.3.3-RCE CS-Cart-1.3.3-RCE Public

    CS-Cart 1.3.3 RCE exploit for CTF

    Python

  4. Vulnerable-Active-Directory-Lab Vulnerable-Active-Directory-Lab Public

    Automated Vulnerable Active Directory Lab inspired by OSCP-style enumeration and exploitation.

    PowerShell

  5. Vulnerability-Management-Lab Vulnerability-Management-Lab Public

    Hands‑on VM lab: Nessus scans & manual patching

  6. Weaponized-Installer-Lab Weaponized-Installer-Lab Public

    Demo lab: Build & deploy a weaponized Windows installer

    HTML