
My values include humility, honesty and resilience
Get in touch
Quote
"Treasure your curiosity and nurture your imagination" - Shirley Ann Jackson, physicist
😎 I adore computers therefore will be diving into new ways to use and test the machines. I spend lots of time on YouTube watching Defcon and Black hat on red team breakdowns — and I love it. Other times, I am usually on Hack The Box, solving challenges and learning how attackers really think. I have worked in SOC environments, earned a few GIAC certs, writing down my notes in pen and paper style ✍️ Whether it's catching weird behavior in a log file or scripting a quick fix, I'm all about hands-on learning and strategizing possible solutions.
My skills
Technical and behavioral
Cybersecurity, to me, is about staying curious and staying ready. I’ve learned to adapt quickly to new tools, analyze unfamiliar threats, and turn uncertainty into clarity. My experience ranges from structured SOC workflows to unstructured CTF environments where quick thinking is everything. I’m comfortable working across red and blue team spaces — not just using tools, but understanding what they reveal about attacker behavior and system weaknesses.
-
Asset mgmt
-
Red teaming
-
Email and phishing
-
Injection attacks
-
Cyber defense
-
Password attacks
-
Social engineering
-
Forensics and crime
-
Ransomware
-
Capture the flag
-
Transport and networks
-
Data privacy
-
Burpsuite
-
Exabeam
-
Windows Azure
-
Windows defender
-
MITRE framework
-
Command line
-
Q radar
-
Splunk
-
Bloodhound
-
Slack
-
Python
-
Powershell
-
My Works
I have on various topics
This is where I get hands-on and figure things out for real. I’ve worked through Hack The Box machines and other challenges that pushed me to think like an attacker and respond like a defender.
-
Forest
User enumeration on domain controller
Cracking NT hash
-
Jeeves
Windows privilege escalation
Meterpreter session migration
-
Sauna
Active directory enumenarion
Bloodhound enumeration
-
Blackfield
Copy and download of ntds.dit
Privilege group access
-
Monteverde
Credential stuffing
Azure AD privilege escalation
-
Chatterbox
Exploit database
Privilege escalation using meterpreter
-
active
enum4linux
Smb share
Contact
Movies that have shaped my passion for computers and disrupton include V for vendetta and the matrix trilogy films.
Get in touch and email me.
-
Address:
Remote -
Email:
2014phlsummer@gmail.com