Offensive Security | Adversary Simlation | Active Directory Exploitation
I’m Velkris, a red team operator and cybersecurity researcher focused on:
- Advanced Active Directory attack simulation and privilege escalation chains
- Adversary emulation aligned to MITRE ATT&CK for enterprise lab environments
- Tradecraft automation and operational tooling development
- Detection engineering and log correlation analysis for Blue Team validation
My approach blends hands-on offensive operations with defensive insight, emphasizing adversary methodology, detection evasion, and iterative learning.
Comprehensive lab-based portfolio covering:
- Active Directory Pentest Lab (Kerberoast, AS-REP, Ticket & Certificate attacks)
- ATT&CK-aligned Adversary Simulations
- GPU-Accelerated Password Auditing (Hashcat / RTX 3080)
- Red Team Toolkit Automation & SOPs
| Certification | Status |
|---|---|
| PNPT | ✅ Completed |
| PJPT | ✅ Completed |
| CRTP | In Progress |
| CRTO | In Progress |
| Security+ | ✅ Completed |
| GPEN -> OSCP -> CRTE -> CPTS -> GRTP -> OSEP -> CRTM -> CAPE -> GXPN -> OSED -> OSEE -> GX-PT | On Track |
Kali Linux • Windows AD • PowerShell • Python
BloodHound • Rubeus • Mimikatz • NetExec
Hashcat • PSexec • Responder • Impacket
Obsidian • GitHub Actions • pipx / venv
- Active Directory Enumeration & Abuse
- Kerberos & PKI Attack Surface Analysis
- Detection Evasion & Log Review (Sysmon / Event IDs)
- Threat Intelligence & ATT&CK Correlation
- Red Team Tool Development & Script Automation
LinkedIn: perry-jared-r
GitHub Portfolio: Red-Team-Portfolio
Email: [email protected]
© 2025 Velkris — Educational Red Team Research | MIT Licensed
All testing and documentation performed in isolated lab environments for research and training purposes only.


