Red Teamer β’ Offensive Tool Developer β’ Co-Founder of Offensys
Building offensive security tools in Go β’ Python β’ Rust β’ Nim
I'm a Red Teamer based in the Netherlands who likes to play around with anything related to hacking, security, programming languages, or tech in general. I love to learn, but I love sharing the things I've learned even more. In my free time, I build offensive security tooling in modern programming languages like Go, Python, Rust, and Nim.
I publish my projects publicly as open-source software in a responsible manner (a much-debated point, I know). The premise is simple: transparency strengthens security. When we build tools in the open, both attackers and defenders can level up their game.
As a co-founder of Offensys, I'm working to make continuous purple teaming accessible to organizations that want to proactively validate their security posture through automated adversary simulation.
Always happy to chat about offensive security, red teaming, or the latest programming languages! Feel free to reach out via Twitter or email.
π― NimPlantLightweight C2 implant written in Nim and Rust A first-stage C2 framework showcasing what modern languages can do for operational security. |
π maldev-for-dummiesPractical malware development workshop Hands-on workshop teaching malware development fundamentals. Used by security professionals worldwide. |
π OSEP-Code-SnippetsCode snippets for Offensive Security's PEN-300 Notable code snippets from my OSEP journey. Community favorite for exam prep. |
π BugBountyScannerAutomated reconnaissance for bug bounty hunting Bash script and Docker image for headless bug bounty reconnaissance. |
I specialize in building offensive security tools, red teaming infrastructure, and C2 frameworks using modern programming languages.
I regularly share knowledge through conference talks and workshops. Check out my conferences repository for slides, materials, and recordings from past presentations.
Recent talks include malware development workshops, red team operations deep-dives, and sessions on building offensive security tools in modern languages. If you're interested in having me speak at your event, feel free to reach out!
As co-founder of Offensys, I'm building a platform for continuous purple teaming. The idea is simple: continuously validate your security controls against real-world attack techniques through automated adversary simulation.
Instead of point-in-time assessments, Offensys provides ongoing security validation that's driven by threat intelligence and executed safely in your environment. We're making purple teaming accessible to organizations that want to proactively test their defenses.
Interested in learning more? Check out offensys.nl or reach out for a demo.
For security professionals: Questions about offensive development, red teaming, or security topics? I'm always up for a chat. Reach out on Twitter or via email.
For organizations: Interested in continuous purple teaming? Visit offensys.nl.
For contributors: Many of my repos welcome contributions. Check out open issues or propose new features!
If my content or open-source contributions have helped you, consider sponsoring me on GitHub β
Stay geeky π€