Dashboard
About Me
Hi, Iβm Sandiso π β a Penetration Tester / Ethical Hacker with a strong focus on offensive security, web application testing, network exploitation, and attack simulation. I have hands-on experience identifying, exploiting, and reporting security vulnerabilities, supported by solid fundamentals in networking, Linux, and Python scripting. My offensive security skills are backed by strong IT and networking foundations, validated through CompTIA (A+, Network+, Security+) and Cisco CCNA certifications, alongside intensive hands-on training from the HyperionDev Cybersecurity Bootcamp.
I have completed TryHackMeβs Pre-security, web fundamentals, Cyber Security 101 and Junior Penetration Tester learning paths, gaining practical experience in reconnaissance, enumeration, privilege escalation, web application exploitation, vulnerability assessment, and penetration testing methodologies across Linux-based environments.
My core focus is offensive security, leveraging tools such as Nmap, Burp Suite, Metasploit, Nessus, and custom Python scripts to simulate real-world attacks. I also maintain working knowledge of defensive operations β including SIEM monitoring (Splunk), SOC workflows, and incident response fundamentals β enabling me to better understand, evade, and challenge defensive controls during security assessments.
π§° Tools & Technologies
| Tool | Description |
|---|---|
| π Python | Scripting, automation & data handling |
| π HTML, CSS, JS | Responsive web design & interactivity |
| π» VS Code | Primary development environment |
| π§ Linux | Command-line mastery, system administration & security tooling |
| π£ Metasploit | Exploitation framework for penetration testing & vulnerability research |
| π TryHackMe | Hands-on cybersecurity training |
| π§ Git & GitHub | Version control & collaboration |
| π‘ Wireshark | Network traffic analysis & packet inspection |
| π Splunk (SIEM) | Log analysis, monitoring & incident detection |
| βοΈ Hosting | GitHub Pages, Netlify, or local servers |
Hands-On Offensive Experience
| Area | Experience |
|---|---|
| Web Application Security | Identified and exploited common web vulnerabilities (OWASP Top 10) through labs and simulated environments |
| Windows Active Directory Labs | Configured Windows Server 2019 environments for AD attacks and privilege escalation practice |
| Penetration Testing Labs | Conducted reconnaissance, exploitation, and reporting across TryHackMe offensive pathways |
| Incident Awareness | Developed understanding of SOC detection and IR processes to improve stealth and attack realism |