You’r right, it’s just another redteamer’s blog, nothing more.
I’ve been passionate about offensive security for years, dedicating a lot of time and energy to stay ahead in this ever-evolving field. My main focus is adversary emulation and red teaming, areas that are always pushing the limits and challenging me to grow. Every day, I’m all about learning, testing, and refining my skills.
To keep advancing, I use my personal homelab as my playground for security research. It’s where I keep my skills sharp and experiment with new tools and techniques, so if you hear someone yelling about DNS, VPN, provisioning, or some weird performance issue… yeah, that’s probably me.
The aim of this blog/site it’s simple, to share what I’m learning, discovering, and finding useful. Obviously not in my native language, because I really like to smash my head on something while i’m trying to be better in english.
I’m not sharing stuff because I think “I’ve made it” or have all the answers. I’m just someone on a journey: always improving, always curious.
This project offers a simple method to deploy a vulnerable Active Directory environment on Proxmox, providing a practical platform for aspiring red teamers to hone their Active Directory skills and test C2 capabilities in a controlled environment.
A simple VSCode development environment for building Beacon Object Files (BOFs), with DevContainer support, ready-to-use templates, and utilities for easy development and testing.