/home/maindavis/system
System Information
Red Team operator focused on APT simulations.
Adversary emulation under MITRE ATT&CK.
Offensive tooling in C#, Go, Python, and C.
[MainDavis@system] ~$ whoami
/home/maindavis/profile
Profile
Offensive cybersecurity consultant specialized in Red Team operations over critical infrastructures. I design custom tooling to automate post-exploitation, validate controls, and emulate real TTPs with a focus on impact and stealth.
[MainDavis@system] ~$ cat dossier.md
/home/maindavis/achievements
Achievements
- › 2022–present: Senior Cybersecurity Consultant @ Cipherbit
- › 2023–2024: Digital Forensics and Cybersecurity Instructor @ U-tad
- › 2019–present: HTB, Root-Me and TryHackMe (CTF & labs)
[MainDavis@system] ~$ ls --opsec --sort=impact
/home/maindavis/terminal
Live Ops
Listening for operator input. Beacon window stable.
Use secure channel for coordination. Noisy ops are sandboxed.
[MainDavis@system] ~$ tail -f opsec.log
/home/maindavis/skills
Skills
- + Adversary emulation and Red Team operations
- + Active Directory: attack paths and persistence
- + EDR evasion and control validation
- + Offensive tooling and automation
- + Web and mobile pentesting (OWASP / NIST)
Always learning, always adapting. OPSEC first.
[MainDavis@system] ~$ cat skills.list
/home/maindavis/certs
Certifications
-
OSCP+
Offensive Security
Verify credential -
eJPTv2
INE / eLearnSecurity
Verify credential -
Certified Red Team Operations Management (CRTOM)
Red Team Leaders
Verify credential
[MainDavis@system] ~$ cat certs.index
/home/maindavis/connect
Connect
- Email maindavis.sec@gmail.com
- Phone +34 655 150 772
- GitHub github.com/MainDavis
- LinkedIn linkedin.com/in/maindavis
[MainDavis@system] ~$ netstat --quiet
/home/maindavis/badges
Badges
Red Teamer APT Simulation Tooling Dev Speaker
[MainDavis@system] ~$ echo $badges