Hello Friend
/usr/bin/whoami
/usr/bin/whoamiWelcome. I'm Bruno, a Cyber Threat Intelligence professional and offensive security enthusiast.
In a landscape where threats are constantly evolving, I believe that the best defense is a deep understanding of the attack. This space serves as my digital laboratory—a documentation of my journey through Red Teaming, DFIR, and Web Exploration.
Here, I don't just capture the flags; I document the methodology, thought process, and tradecraft necessary to dismantle secure systems. Whether you're an experienced professional seeking new perspectives or someone just starting out, I hope these files provide the insights you need.
Select a platform to access mission reports and specific labs.
🧠 m3th0d0l0gy & ph1l0s0phy
🧠 m3th0d0l0gy & ph1l0s0phyMy approach to security is rooted in Threat Intelligence. Understanding adversaries TTPs (Tactics, Techniques, and Procedures) allows us to simulate realistic attacks and build more resilient defenses.
In these write-ups, you will find:
Reconnaissance: Passive and active information gathering (OSINT).
Weaponization: Creating payloads and understanding exploits.
Post-Exploitation: Lateral movement, persistence, and data exfiltration.
Forensic: Analysis of artifacts left behind (Blue Team perspective).
Last updated









