About

About

🩸 About Me β€” Jay Tiwari

Role: Red Teamer Year: 3rd Year Engineering Location: India

🧠 Who Am I?

Hey there! I’m Jay Tiwari, a passionate Red Teamer currently in my 3rd year of engineering. I live and breathe offensive security β€” from breaching Active Directory to crafting custom payloads. My playground? Platforms like Hack The Box, Vulnlab, TryHackMe, and internal labs, where I sharpen my skills daily.


πŸ› οΈ Skills & Specialties

  • πŸ΄β€β˜ οΈ Red Teaming & Adversary Simulation
  • πŸ–₯️ Active Directory Attacks (Kerberos, ACLs, Delegation, etc.)
  • πŸ§ͺ BloodHound, Rubeus, Mimikatz, and custom C2 tooling
  • 🐚 Shellcode loaders, AMSI/ETW patching, and evasion techniques
  • βš™οΈ Cobalt Strike, Mythic, Sliver
  • πŸ‘¨β€πŸ’» Custom scripting in Python, C++, and PowerShell

🧾 Certifications

CertificationProvider
πŸ’₯ CRTLZero-Point Security
πŸ›‘οΈ CRTOZero-Point Security
🧠 CRTPAltered Security
🎯 CRTeamerSecOps Group

Each of these helped me master different parts of offensive security β€” from AD enumeration to full-on red team ops.


πŸ”₯ What I’m Up To

  • πŸ‘¨β€πŸ’» Grinding HTB (Active Directory, Windows, and insane boxes)
  • πŸ› οΈ Building custom internal tools for AD enumeration and evasion
  • 🧬 Reversing binaries and writing shellcode loaders
  • 🎯 Preparing for more advanced Red Team certifications (OSCE3, RTO, etc.)

πŸ•ΈοΈ Online Presence


☠️ Final Words

β€œRed Teaming is not just about popping boxes β€” it’s about thinking like your adversary and staying one step ahead.”

Feel free to reach out or connect if you’re into Red Teaming http://jaytiwari.me, CTFs, or just want to chat about breaking things for fun πŸ”₯


Trending Tags