Report this freelancer

Covenant

Offensive Security Consultant
Australia
  • Successful Projects
    0
  • Services Delivered
    2
  • Completed Services
    0
  • Services Pending
    0

Freelancer Information

I’m a freelance penetration tester with expertise in identifying and exploiting vulnerabilities across web applications, APIs, networks, and cloud environments. With multiple Offensive Security certifications (OSWE, OSCE3, OSED), I specialize in advanced web application security, exploit development, and red teaming.

What I Offer:
šŸ”¹ Web & API Penetration Testing – Identify security flaws in your applications before attackers do.
šŸ”¹ Network & Infrastructure Security – Assess internal/external networks for misconfigurations and weaknesses.
šŸ”¹ Exploit Development & Code Review – Discover zero-day vulnerabilities and custom exploits.
šŸ”¹ Red Team & Adversary Simulations – Test your security posture against real-world attack scenarios.
šŸ”¹ Cloud & Active Directory Security – Harden your cloud and corporate environments.

I provide detailed reports with proof-of-concept exploits, risk analysis, and remediation guidance to ensure your systems remain secure.

Let’s work together to secure your applications before attackers do. Get in touch to discuss your security needs!


Work & Experience

O
2021 - Current Offensive Cybersecurity Consultant
HIDDEN

As an Offensive Cybersecurity Consultant, I specialize in identifying, exploiting, and mitigating security vulnerabilities across web applications, networks, and enterprise environments. With certifications including OSWE, OSCE3, and OSED, my expertise spans penetration testing, exploit development, and adversary simulations. What I Do: šŸ”¹ Web & API Penetration Testing – Identifying and exploiting security flaws in applications. šŸ”¹ Red Teaming & Adversary Simulations – Emulating real-world cyber threats to assess an organization’s security posture. šŸ”¹ Exploit Development & Reverse Engineering – Crafting custom exploits and analyzing vulnerabilities. šŸ”¹ Cloud & Active Directory Security – Assessing and hardening corporate infrastructure. šŸ”¹ Secure Code Review – Identifying security risks in application source code. I work closely with clients to deliver comprehensive assessments, proof-of-concept exploits, and remediation strategies, ensuring their systems are resilient against real-world threats.


Awards

O
2021 OSCP
A hands-on penetration testing certification requiring exploitation of multiple machines in a controlled environment, demonstrating proficiency in network security, privilege escalation, and Active Directory attacks.
O
2023 OSEP
Focused on advanced penetration testing techniques, including Active Directory attacks, evasive payload development, and defense bypass techniques used in real-world engagements.
O
2024 OSWE
A highly technical web application security certification emphasizing white-box testing, source code analysis, and advanced exploitation techniques such as SQL injection, authentication bypasses, and insecure deserialization.
O
2023 OSED
A deep dive into exploit development, covering Windows binary exploitation, reverse engineering, buffer overflows, and bypassing modern mitigations such as DEP and ASLR.
O
2024 OSCE3
A recognition awarded upon achieving OSWE, OSEP, and OSED certifications, demonstrating expertise in offensive security across web applications, networks, and exploit development.
C
2022 CRTO
Focuses on adversary emulation and real-world red teaming techniques, including Active Directory enumeration, C2 frameworks, and post-exploitation methodologies.
P
2021 PNPT
A practical certification covering network penetration testing, Active Directory exploitation, OSINT, and report writing with a focus on real-world ethical hacking scenarios.
C
2022 Corelan Bootcamp
An intensive exploit development course covering memory corruption, shellcoding, buffer overflows, and advanced Windows exploitation techniques.
C
2022 Corelan ADV
A deep dive into advanced exploit development, covering complex heap exploitation, return-oriented programming (ROP), and bypassing modern security mechanisms.