Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings
@davidonlinearchive
davidonlinearchive
Follow

David Disu davidonlinearchive

🎢
Feeling pwnsome!
Offensive Security

Block or report davidonlinearchive

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
davidonlinearchive /README.md

Greetings friend, I'm David (davidonlinearchive) πŸ––

MS GIF

About Me

I am an Offensive Security Enthusiast specializing in Web, API, and Google Cloud Platform (GCP) testing. When I am not hunting for vulnerabilities, I am building automated infrastructure and dabbling in cloud engineering with GCP.

  • I'm currently learning Red Team Operations
  • I participate and blog some CTF Challenges here: dev.to/davidonlinearchive
  • I enjoy writing Offensive security tools
  • I'm looking to collaborate with Cyber Security Enthusiasts and Hackers

Projects

Active Directory Pentest Lab

A virtualized offensive security environment built to simulate a corporate infrastructure. It allows for the safe execution of Kerberos-based attacks and the study of privilege escalation within a Windows domain.

Key Features:

  • Isolated VM-to-VM communication with controlled internet access
  • Integrated BloodHound and Neo4j to identify and map privilege escalation paths
  • Modular design allowing for the addition of multiple Windows clients and attack nodes

Technologies: Windows Server 2019, BloodHound, PowerShell, Kali Linux, Impacket

Repo: Active-Directory-Lab

SDirB

A directory enumeration tool designed for rapid path discovery and security assessment of web applications.

Key Features:

  • Utilizes Go worker pools and goroutines for performant, multi-threaded discovery
  • Implemented mutex synchronization to prevent data conflicts across workers

Technologies: Golang, Goroutines, HTTP

Repo: sdirb

Google Cloud Terraform Starter

An automated Terraform project to deploy a secure, Debian web server on Google Cloud Platform.

Key Features:

  • Provisions a secure web server environment with a single command
  • Implements automated setup for isolated environments and key security tools

Technologies: Google Cloud, Terraform, Debian

Repo: gcp-terraform-starter

Programming Languages

Go Bash Rails HTML PowerShell Python Postgres

Cloud and OS

Google Cloud Microsoft Azure Arch Linux Debian Kali Linux Windows

Socials

Dev.to LinkedIn GitHub

Pinned Loading

  1. scurl scurl Public

    A Simple curl implementation built with golang and cobra.

    Go

  2. PayloadsAllTheThings PayloadsAllTheThings Public

    Forked from swisskyrepo/PayloadsAllTheThings

    A list of useful payloads and bypass for Web Application Security and Pentest/CTF

    Python

  3. sdirb sdirb Public

    A simple concurrent directory-brute force tool.

    Go

  4. gcp-terraform-starter gcp-terraform-starter Public

    An automated Terraform project to deploy a secure, debian web server on Google Cloud Platform.

    HCL

  5. api-security-toolkit api-security-toolkit Public

    A collection of standalone bash scripts to automate the installation of essential API penetration testing tools on Debian/Ubuntu systems.

    Shell

  6. Active-Directory-Lab Active-Directory-Lab Public

    A fully functional Active Directory (AD) cybersecurity laboratory environment built on VirtualBox to simulate enterprise infrastructure for offensive security research

    PowerShell

AltStyle γ«γ‚ˆγ£γ¦ε€‰ζ›γ•γ‚ŒγŸγƒšγƒΌγ‚Έ (->γ‚ͺγƒͺγ‚ΈγƒŠγƒ«) /