Skip to content
View jusot99's full-sized avatar
🏴‍☠️
Focusing
🏴‍☠️
Focusing

Block or report jusot99

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
jusot99/README.md

Elimane Juuf

Offensive Security | Red Team Operations | Adversary Simulation


Overview

Offensive security practitioner with a foundation in software development and a strong focus on hands‑on attack simulation. I actively study and practice real‑world offensive techniques across web applications, internal networks, Active Directory environments, wireless systems, and Linux‑based infrastructures.

My work is driven by disciplined experimentation, tool‑building, and continuous learning. I focus on understanding attacker behavior in depth — how systems fail, how defenses respond, and how small weaknesses compound into real security risks. I build and test in controlled environments with an emphasis on ethics, precision, and technical growth.


Core Capabilities

  • End-to-end offensive security assessments across Linux and Windows environments
  • Web application exploitation and internal network compromise
  • Active Directory attack paths, privilege escalation, and lateral movement
  • Wireless security testing and internal threat simulation
  • Secure development with focus on attack surface reduction
  • Adversary emulation aligned with red team methodologies
  • Custom tooling for reconnaissance, exploitation, and automation

Technical Stack

Kali Linux

Selected Work

  • 🚀 semok — Multi-threaded network stress simulation tool built for controlled testing and research. Supports proxy chaining, header manipulation, and response analysis.
  • 🌐 dnsinfo — DNS enumeration and analysis utility used to map exposed records and identify external attack surfaces.
  • 🐚 (More coming soon… because the lab never sleeps)

Featured Writeups

  • 🧠 HTB – CDNio (Web Cache Poisoning)
    Analysis of a chained cache poisoning vulnerability involving unsafe CDN caching, regex route bypass, and JWT worker desynchronization. Includes exploit automation and defensive remediation notes.

🧩 Digital Challenge

Think you understand hacking? Then try to decode the shadows I leave behind. This isn’t about certs or trophies. It’s about mastery through silence, logic, and will.

# Challenge: decrypt the essence behind mastery
from hashlib import sha256 as h
from itertools import product as p

f = lambda s, r: [h((b+k).encode()).digest() for _ in range(r) for b,k in [s]][-1].hex()
c = lambda: [f(x,7) for x in p(['AD','WiFi','Embedded','Web','Net'],['recon','pivot','exploit','evade','persist'])]
s = [x for x in c() if x.startswith('00')]

print("Skill encoded in shadows. Decode if you dare." if len(s) > 3 else "Keep digging, no shortcuts here.")

💡 Check the patterns if you're serious. The truth isn't printed — it's encrypted.

> 🧠 The real patterns aren’t in the code — they’re on the wire.  
> 💡 Trace the signals across my website. 
> If you find what matters, you’ll know where to follow.

Signal

Operate quietly. Measure impact. Leave systems stronger than you found them. And always have a backup… or two. 😉


Operational Focus

  • Advanced Active Directory abuse paths and delegation scenarios
  • Covert command-and-control concepts and payload delivery
  • Deep kernel-level Linux hardening
  • Stealth-oriented Wi-Fi post-exploitation workflows

💬 Get In Touch


jusot99's Stats

Pinned Loading

  1. pwnhub pwnhub Public

    Python 7

  2. jusot99.github.io jusot99.github.io Public

    Shell 4