Skip to content
View warpedatom's full-sized avatar

Block or report warpedatom

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
warpedatom/README.md

Velkris Banner

Velkris | Red Team & Adversary Simulation

Offensive Security | Adversary Simlation | Active Directory Exploitation


Portfolio MITRE ATT&CK LinkedIn Followers Last Commit Repo size Stars Visitor Count


About Me

I’m Velkris, a red team operator and cybersecurity researcher focused on:

  • Advanced Active Directory attack simulation and privilege escalation chains
  • Adversary emulation aligned to MITRE ATT&CK for enterprise lab environments
  • Tradecraft automation and operational tooling development
  • Detection engineering and log correlation analysis for Blue Team validation

My approach blends hands-on offensive operations with defensive insight, emphasizing adversary methodology, detection evasion, and iterative learning.


Current Projects

Comprehensive lab-based portfolio covering:

  • Active Directory Pentest Lab (Kerberoast, AS-REP, Ticket & Certificate attacks)
  • ATT&CK-aligned Adversary Simulations
  • GPU-Accelerated Password Auditing (Hashcat / RTX 3080)
  • Red Team Toolkit Automation & SOPs

Certifications & Ongoing Training

Certification Status
PNPT ✅ Completed
PJPT ✅ Completed
CRTP In Progress
CRTO In Progress
Security+ ✅ Completed
GPEN -> OSCP -> CRTE -> CPTS -> GRTP -> OSEP -> CRTM -> CAPE -> GXPN -> OSED -> OSEE -> GX-PT On Track

Core Tool Stack

Kali LinuxWindows ADPowerShellPython
BloodHoundRubeusMimikatzNetExec
HashcatPSexecResponderImpacket
ObsidianGitHub Actionspipx / venv


Knowledge Areas

  • Active Directory Enumeration & Abuse
  • Kerberos & PKI Attack Surface Analysis
  • Detection Evasion & Log Review (Sysmon / Event IDs)
  • Threat Intelligence & ATT&CK Correlation
  • Red Team Tool Development & Script Automation

Connect & Collaborate

LinkedIn: perry-jared-r
GitHub Portfolio: Red-Team-Portfolio
Email: [email protected]


© 2025 Velkris — Educational Red Team Research | MIT Licensed
All testing and documentation performed in isolated lab environments for research and training purposes only.

Pinned Loading

  1. Velkris-Red-Team-Portfolio Velkris-Red-Team-Portfolio Public

    Lab-based red team & penetration testing portfolio

    HTML 2

  2. OffsetInspect OffsetInspect Public

    PowerShell utility to map AV detection offsets in PowerShell scripts to their corresponding line numbers for static analysis and red-team tooling.

    PowerShell 24 3