Penetration Testing Specialist

I'm

Cyber Samurai • Intermediate Red Team Operator • Digital Guardian

Dedicated to identifying vulnerabilities before adversaries can exploit them.
Protecting digital assets with precision, discipline, and unwavering vigilance.

0
Certifications
0
Projects+
0
Years Experience
Scroll Down

About Me

The path of the cyber samurai

Yamashita Profile

Security First

Always Learning

Like a samurai perfecting the art of the sword, I have dedicated myself to mastering the way of penetration testing and cybersecurity.

My mission is to identify vulnerabilities before adversaries can exploit them, protecting digital assets with unwavering vigilance. I approach each engagement with the discipline and focus of a warrior, combining technical mastery with strategic thinking.

The path of cybersecurity requires constant learning and adaptation—principles that guide my every action. Through rigorous training and real-world experience, I've developed expertise across multiple domains of offensive security.

Technical Excellence

Proficient in Python, Bash, and security tooling

Strategic Mindset

Combining offensive and defensive perspectives

Certified Professional

PNPT, PJPT, CNSP, Google Cybersecurity, CRTA, CRTOM, CCEP, CCPP

Arsenal of Skills

Tools and techniques for modern cybersecurity

Network Penetration Testing

Advanced network reconnaissance, exploitation, and post-exploitation techniques

Nmap Metasploit NetExec

Web Application Security

OWASP Top 10 and beyond - comprehensive web app vulnerability assessment

Burp Suite OWASP ZAP SQLMap

Active Directory

AD enumeration, privilege escalation, lateral movement, and domain compromise

BloodHound Impacket Rubeus

API Security Testing

REST and GraphQL API vulnerability identification and exploitation

Postman GraphQL JWT

Scripting & Automation

Custom tool development, exploit scripting, and automation frameworks

Python Bash PowerShell

Cloud Security

AWS, Azure, and GCP security assessment and exploitation

AWS Azure GCP

Social Engineering

Human factor security assessment and phishing campaign execution

Phishing OSINT Pretexting

Reporting & Documentation

Professional technical and executive reporting with remediation guidance

Technical Executive CVSS

Professional Certifications

Validated expertise in cybersecurity

PJPT Certification

PNPT

Practical Network Penetration Tester

TCM Security
PNPT Certification

PJPT

Practical Junior Penetration Tester

TCM Security
Certified Red Team Analyst

CRTA

Certified Red Team Analyst

Cyberwarfare Labs
Active Directory Red Team Specialist

AD-RTS

Certified Active Directory Red Team Specialist

Cyberwarfare Labs
CNSP Certification

CNSP

Certified Network Security Practitioner

The SecOps Group
Google Cybersecurity Professional

Google Cybersecurity

Cybersecurity Professional Certificate

Google
Certified Red Team Management

CRTOM

Certified Red Team Management

ReadTeamLeaders
Certified Cybersecurity Educator Professional

CCEP

Certified Cybersecurity Educator Professional

ReadTeamLeaders
Certified C++ Practitioner

CCPP

Certified C++ Practitioner

ReadTeamLeaders

Featured Projects

Campaigns and victories in the digital battlefield

Web Application Strike

Completed

Conducted comprehensive black-box testing on a complex e-commerce platform. Identified critical SQLi, XSS, and Broken Access Control vulnerabilities.

Web Security SQLi XSS OWASP

Network Fortress

Completed

Led internal network penetration test for enterprise organizations. Uncovered misconfigured services and lateral movement vectors through AD.

Network Security Active Directory Lateral Movement PrivEsc

ReconQuest Framework

Open Source

Automated reconnaissance tool with intelligent filtering for directory and subdomain scanning, reducing false positives during pentesting engagements.

Python Automation OSINT Recon

Cloud Security Assessment

Completed

Comprehensive cloud penetration testing covering AWS, Azure, and GCP. Identified misconfigurations and privilege escalation paths.

AWS Azure GCP Cloud Security

Let's Connect

Ready to discuss security challenges or collaboration opportunities?

contact.sh
$ ./initiate_contact.sh
[*] Initializing secure connection...
[+] Ready to receive transmission
[*] Awaiting your message...
$ _