About

About

🩸 About Me β€” Jay Tiwari

Role: Red Teamer Year: 3rd Year Engineering Location: India

🧠 Who Am I?

Hey there! I’m Jay Tiwari, a passionate Red Teamer currently in my 3rd year of engineering. I live and breathe offensive security β€” from breaching Active Directory to crafting custom payloads. My playground? Platforms like Hack The Box, Vulnlab, TryHackMe, and internal labs, where I sharpen my skills daily.

If it involves domain dominance, evasion tactics, or post-exploitation magic β€” I’m in.


πŸ› οΈ Skills & Specialties

  • πŸ΄β€β˜ οΈ Red Teaming & Adversary Simulation
  • πŸ–₯️ Active Directory Attacks (Kerberos, ACLs, Delegation, etc.)
  • πŸ§ͺ BloodHound, Rubeus, Mimikatz, and custom C2 tooling
  • 🐚 Shellcode loaders, AMSI/ETW patching, and evasion techniques
  • βš™οΈ Cobalt Strike, Mythic, Sliver
  • πŸ‘¨β€πŸ’» Custom scripting in Python, C++, and PowerShell

🧾 Certifications

CertificationProvider
πŸ’₯ CRTLZero-Point Security
πŸ›‘οΈ CRTOZero-Point Security
🧠 CRTPAltered Security
🎯 CRTeamerSecOps Group

Each of these helped me master different parts of offensive security β€” from AD enumeration to full-on red team ops.


πŸ”₯ What I’m Up To

  • πŸ‘¨β€πŸ’» Grinding HTB (Active Directory, Windows, and insane boxes)
  • πŸ› οΈ Building custom internal tools for AD enumeration and evasion
  • 🧬 Reversing binaries and writing shellcode loaders
  • 🎯 Preparing for more advanced Red Team certifications (OSCE3, RTO, etc.)

πŸ•ΈοΈ Online Presence


☠️ Final Words

β€œRed Teaming is not just about popping boxes β€” it’s about thinking like your adversary and staying one step ahead.”

Feel free to reach out or connect if you’re into Red Teaming, CTFs, or just want to chat about breaking things for fun πŸ”₯


Trending Tags