Skip to content
View pdoffl's full-sized avatar

Block or report pdoffl

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
pdoffl/README.md

πŸ‘‹ Hello there, I'm Pratik Das

Welcome to my GitHub profile.

Red Team Consultant | Penetration Tester | Security Researcher

"I help organizations understand their security posture by attacking it."

I'm an offensive security professional with 3 years of hands-on experience conducting red team operations, penetration testing, and adversarial emulation across enterprise, government, and industrial control environments. Graduated with MS in Cybersecurity from Northeastern University.

Previously: Security Consultant at Ernst & Young, Cybersecurity Consultant for Government of India (commended by PM's Office 2021), and Cybersecurity Consultant Co-op at Factory Mutual.


🎯 Core Expertise

|── Offensive Security
β”‚   β”œβ”€β”€ Red Team Operations & Adversarial Emulation (MITRE ATT&CK)
β”‚   β”œβ”€β”€ Active Directory Exploitation (Kerberoasting, ADCS, ACL abuse)
β”‚   β”œβ”€β”€ Web Application Penetration Testing (SQLi, XSS, RCE)
β”‚   β”œβ”€β”€ C2 Operations (Cobalt Strike, Sliver, custom frameworks)
β”‚   └── Post-Exploitation (Lateral Movement, Privilege Escalation, Persistence)
β”‚
β”œβ”€β”€ Security Research & Development
β”‚   β”œβ”€β”€ Custom C2 Framework Development (ARM64/Linux)
β”‚   β”œβ”€β”€ Exploit Development (Buffer overflows)
β”‚   β”œβ”€β”€ Malware Analysis & Reverse Engineering
β”‚   └── ICS/OT Security Assessment
β”‚
└── Education & Content Creation
    β”œβ”€β”€ CTF Challenge Design & Infrastructure
    β”œβ”€β”€ Technical Blog Writing
    └── Security Lab Design Automation (Docker, Bash, Python, Virtual Machines)

πŸ› οΈ Technical Arsenal

Languages & Frameworks

C/C++ β€’ Python β€’ ARM64/Aarch64 Assembly β€’ x86/x64 Assembly β€’ Go β€’ PowerShell β€’ Bash β€’ C#

Offensive Security Tools

Cobalt Strike β€’ Metasploit β€’ Sliver C2 β€’ BloodHound β€’ Mimikatz β€’ Impacket β€’ CrackMapExec
NetExec β€’ Burp Suite β€’ SQLMap β€’ Nmap β€’ Responder β€’ Empire β€’ Covenant β€’ Havoc C2

Specializations

Active Directory Security β€’ Web Application Security β€’ Binary Exploitation
ICS/OT Security β€’ Wireless Security (WPA2, EAP) β€’ Cloud Security (AWS/GCP)
Container Security (Docker, Kubernetes) β€’ SIEM Operations (Splunk)

πŸ“ Publications & Research

πŸ“š Technical Blogs

πŸ“„ Academic Publication

πŸŽ“ Capstone Research

  • Assessing PiKVM as a Threat in Modern Organizations - Analyzed weaponization of Raspberry Pi-based KVMs by APT groups, developed 5+ detection/remediation guidelines. More on my LinkedIn profile.

πŸ† Certifications & Achievements

Offensive Security Certifications

  • πŸ”΄ OSCP - Offensive Security Certified Professional
  • πŸ”΄ CRTO - Certified Red Team Operator (Zero-Point Security)
  • πŸ”΄ CRTP - Certified Red Team Professional (Altered Security)
  • πŸ”΅ CEH - Certified Ethical Hacker
  • πŸ”΅ ECSA - EC-Council Certified Security Analyst
  • 🟒 PT1 - TryHackMe Junior Penetration Tester

Recognition

  • πŸ… PM's Office Commendation (July 2021) - For offensive security and adversary emulation excellence.
  • πŸ₯‰ 3rd Place - Malware Analysis CTF, Northeastern University (Spring 2025)

🀝 Let's Connect

I'm always interested in discussing offensive security, red team operations, exploit development, and security research.

Popular repositories Loading

  1. FauxRansomware FauxRansomware Public

    A proof-of-concept minimal ransomware project.

    C#

  2. LRAD LRAD Public

    A CTF challenge based on insecure OpenLDAP deployment in a docker

    Shell

  3. Reverse-Shell Reverse-Shell Public

    A simple PoC for reverse shell and its handler

    Python

  4. PowerDetect-PiKVM PowerDetect-PiKVM Public

    A PoC PowerShell script engineered to detect PiKVM connection on Windows system

    PowerShell

  5. Write-Ups Write-Ups Public

    Some write-ups for CTFs, Boot-to-Roots systems, and challenges on various platforms

  6. CanaryTakeover CanaryTakeover Public

    A Python-based PoC for a Linux based application vulnerable to stack-based buffer overflow. Implemented for NEU's CY5130 Project.

    Python