Red team operations, infrastructure penetration testing,
and adversary simulation. Built on Swiss precision.
Offensive security operator based in Geneva, Switzerland. I build and break infrastructure — from hardened Linux servers to complex enterprise environments.
My approach is first principles: understanding systems at the kernel level, the packet level, the byte level. I don't use tools I don't understand.
Currently pursuing OSCP certification while running an active Proxmox lab environment on dedicated Hetzner hardware. Every engagement is backed by real operational infrastructure and documented methodology.
Available for red team operations, infrastructure penetration testing, and security architecture review.
Full-scope adversary simulation. I operate as a real attacker — with a methodology that mirrors APT behaviour, not checkbox compliance. Objective-based, stealth-oriented, documented.
Linux servers, network perimeters, cloud infrastructure. Internal and external assessments with complete exploitation chains and actionable remediation roadmaps.
Defence from the attacker's perspective. nftables, Fail2ban, SSH hardening, LUKS encryption, audit trails. Hardening that actually survives scrutiny — not just an audit checklist.
AI-augmented security pipelines. Automating reconnaissance, report generation, and detection logic — accelerating engagements without sacrificing depth or rigour.
Certifications are a signal, not a destination. The OSCP pursuit is a commitment to methodology — proving exploitation capability under controlled, verified conditions.
Every certification in this roadmap answers a specific question a high-value client will ask: can you actually do this?
High-value engagements only. If you're serious about your attack surface, let's have a direct conversation.