Aspiring pentester | Preparing for OSCP | Offensive security & red-team practice
[MISSION_OBJECTIVE]
Target = "Professional Penetration Tester"
Certification= "OSCP (Offensive Security Certified Professional)"
Status = "Escalating Privileges..."
[ATTACK_VECTORS]
Focus_01 = "Penetration Testing"
Focus_02 = "Privilege Escalation (Linux/Windows)"
Focus_03 = "Malware Analysis"
Focus_04 = "Exploit Development"
[TRAINING_PROTOCOL]
Environment = ["THM Labs (Active)", "PWK Labs", "HackTheBox (Active)", "VulnHub"]
Routine = "Daily Learning && Writeup Analysis"
Logs = "Check /notes directory"
# SYSTEM DIAGNOSTICS
# ------------------
User : w01f
Machine : mad (Laptop)
Role : Offensive Security Student / Pentester
Target : OSCP Certification & VAPT
Current_Loc : IN
class Profile:
def __init__(self):
self.username = "w01f"
self.languages = ["Python", "Bash"]
self.tools = ["***"]
def current_research(self):
return [
"OSCP",
"Pentester",
"Malware Analysis",
"Memory Forensics"
]
def status(self):
return "Compiling knowledge... please wait."| Protocol | Description | Status |
|---|---|---|
| Pentester | OSCP learner. | IN_PROGRESS |
| Mal Analysis | Learning mal learning modules. | IN_PROGRESS |
| Forensics_AI | Researching fileless malware detection using AI. | IN_PROGRESS |

