Skip to content
View Neofetcher's full-sized avatar
🖊️
🖊️

Block or report Neofetcher

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Neofetcher/README.md

Hello

Cybersecurity graduate with hands-on experience in penetration testing, Active Directory exploitation, and SIEM-based threat detection. Skilled in Linux, Metasploit, Burp Suite, Nmap, Elastic SIEM, and Microsoft Defender, with a strong foundation in vulnerability assessment, privilege escalation, and security monitoring.

Experienced in Windows and Linux environments, Python-based security scripting, and building self-hosted security labs to simulate real-world attacks and defenses. Actively pursuing certifications and seeking entry-level opportunities in SOC, penetration testing, or cybersecurity analyst roles.

Projects:

  • Vulnerable Machine Exploitation Labs Exploited intentionally vulnerable machines to simulate real-world attack scenarios. Performed network enumeration and vulnerability scanning. Conducted post-exploitation steps and documented findings in structured penetration test reports. Machines exploited include: Blue, Dev, and others.
  • Active-Directory-AD-Lab-Environment This project presents a virtualized Active Directory (AD) lab environment designed for academic study, cybersecurity training, and system administration practice. The lab simulates a Windows-based domain infrastructure, including a Domain Controller, Windows clients.
  • Active Directory Lab Exploitation Simulated attacks on a vulnerable Active Directory environment, mimicking real-world internal penetration tests. Achieved domain admin privileges through privilege escalation and token impersonation techniques. Documented attack chains and mitigation strategies in detailed reports.
  • AWS VPC Creation and Hardening This project focuses on designing, deploying, and securing an AWS Virtual Private Cloud following security best practices. The goal is to create a segmented network, limit exposure to the internet, and apply defense in depth controls at the network level.
  • Cloud Honeypot Lab Project Simulated real-world security events using Nmap on Kali Linux. Queried and analyzed events using Elastic SIEM for threat detection.
  • Python Keylogger Developed a keylogger for educational use. Captures keystrokes, clipboard data, and system info while running stealthily in the background.

Pinned Loading

  1. Vulnerable-Machine-Exploitation-Labs Vulnerable-Machine-Exploitation-Labs Public

    Exploited intentionally vulnerable machines to simulate real-world attack scenarios.

  2. Active-Directory-Lab-Exploitation Active-Directory-Lab-Exploitation Public

    Simulated attacks on a vulnerable Active Directory environment, mimicking real-world internal penetration tests. Achieved domain admin privileges through privilege escalation and token impersonatio…

  3. Active-Directory-AD-Lab-Environment Active-Directory-AD-Lab-Environment Public

    This project presents a virtualized Active Directory (AD) lab environment designed for academic study, cybersecurity training, and system administration practice. The lab simulates a Windows-based …

  4. AWS-VPC-Creation-and-Hardening AWS-VPC-Creation-and-Hardening Public

    This project focuses on designing, deploying, and securing an AWS Virtual Private Cloud following security best practices. The goal is to create a segmented network, limit exposure to the internet,…