
Daniel’s
Digital lab
Offensive Security
Offensive Security is a proactive cybersecurity strategy in which organizations use the same tactics as malicious threat actors to strengthen their networks. Tactics include Digital Penetration Testing, Physical Penetration Testing, Vulnerability Scanning and Assessment, Policy Creation and Evaluation, Hardening Exercises, and Scenario-Driven Exercises in which managers can learn how best to respond to certain threats.
I Dabble in not just all of the above but I also have experience and interest in the Defensive Blue Team of Cybersecurity.
RFID MANipulation
I used an ICopyX to read, copy, clone, and ultimately replicate RFID cards for access into important areas.
Try Hack Me and hack the box
Besides the numerous certifications I am working on, I am also working on sharpening my intuition for digital vulnerability exploitation. Hack the Box and Try Hack Me have been my preferred platforms for doing so and I tackle these challenges as often as I can.
Research Paper
I am currently co-authoring a research paper on binaries and executables for programmable logic controllers.
⊕
Most Important Completed Project

During my time at SecureWon I created Disaster Recovery, Incident Response, and Business Continuity Plan templates for clients who were interested in having their cybersecurity documentation boosted.
prior experiences
- Network Security Engineer Intern
- Technology Analyst
- Organization President
- Organization Executive Member
-
ICopyX Writeup
The ICopyX is an incredible tool made by the same people who make the Proxmark.I have really enjoyed its simple control scheme making RFID hacking, cloning and decoding far easier than using a laptop connected reader and software. Unfortunately it comes with one major downside, if not used frequently the eMMC chip used for storing…
-
THM – You Got Mail
Try Hack Me’s Challenge Box: You Got Mail was a new one to Try Hack Me and it piqued my interest. So I decided to start working on Try Hack Me’s boxes. Below you will find the notes that I documented over the course of the three days, (2.5hrs total spent actually working on the…