Dashboard

About Me

Hi, I’m Sandiso πŸ‘‹ β€” a Penetration Tester / Ethical Hacker with a strong focus on offensive security, web application testing, network exploitation, and attack simulation. I have hands-on experience identifying, exploiting, and reporting security vulnerabilities, supported by solid fundamentals in networking, Linux, and Python scripting. My offensive security skills are backed by strong IT and networking foundations, validated through CompTIA (A+, Network+, Security+) and Cisco CCNA certifications, alongside intensive hands-on training from the HyperionDev Cybersecurity Bootcamp.

I have completed TryHackMe’s Pre-security, web fundamentals, Cyber Security 101 and Junior Penetration Tester learning paths, gaining practical experience in reconnaissance, enumeration, privilege escalation, web application exploitation, vulnerability assessment, and penetration testing methodologies across Linux-based environments.

My core focus is offensive security, leveraging tools such as Nmap, Burp Suite, Metasploit, Nessus, and custom Python scripts to simulate real-world attacks. I also maintain working knowledge of defensive operations β€” including SIEM monitoring (Splunk), SOC workflows, and incident response fundamentals β€” enabling me to better understand, evade, and challenge defensive controls during security assessments.

🧰 Tools & Technologies

Tool Description
🐍 Python Scripting, automation & data handling
🌐 HTML, CSS, JS Responsive web design & interactivity
πŸ’» VS Code Primary development environment
🐧 Linux Command-line mastery, system administration & security tooling
πŸ’£ Metasploit Exploitation framework for penetration testing & vulnerability research
πŸ” TryHackMe Hands-on cybersecurity training
🧠 Git & GitHub Version control & collaboration
πŸ“‘ Wireshark Network traffic analysis & packet inspection
πŸ“Š Splunk (SIEM) Log analysis, monitoring & incident detection
☁️ Hosting GitHub Pages, Netlify, or local servers

Hands-On Offensive Experience

Area Experience
Web Application Security Identified and exploited common web vulnerabilities (OWASP Top 10) through labs and simulated environments
Windows Active Directory Labs Configured Windows Server 2019 environments for AD attacks and privilege escalation practice
Penetration Testing Labs Conducted reconnaissance, exploitation, and reporting across TryHackMe offensive pathways
Incident Awareness Developed understanding of SOC detection and IR processes to improve stealth and attack realism