About
π Hi, Iβm Enrik
Iβm a cybersecurity practitioner focused on offensive security, automation, and red team operations.
This site is my technical journal β where I document labs, tooling, and workflows used in penetration testing and adversary simulation.
Everything here is built through practice, experimentation, and continuous learning.
π‘οΈ Areas of Focus
π΄ Offensive Security
- Network & web penetration testing
- Internal & external assessments
- Privilege escalation & lateral movement
- Active Directory attacks
- Post-exploitation workflows
π§ͺ Labs & Practice
Most of my learning happens through practical environments and self-built labs.
I regularly work on:
- TryHackMe and similar training platforms
- Active Directory lab environments
- Pivoting and tunneling scenarios
- Internal network enumeration
- Tool testing and workflow validation
I use these labs to test techniques and improve automation.
π Core Projects
π ATLAS β Automated Target Logging & Scanning
A deterministic reconnaissance and execution engine designed for structured security testing.
Key features:
- Tool orchestration via templates
- Rule-based routing
- Reproducible assessments
- Headless operation
π Learning & Training
I actively train through:
- π΄ββ οΈ Capture The Flag (CTF) platforms
- Realistic attack labs
Current focus:
- Active Directory attacks
- Evasion techniques
- Red team infrastructure
Skill is built in labs β not in theory.
ποΈ What Youβll Find on This Site
| Section | Content |
|---|---|
| π Recon | Enumeration & discovery workflows |
| βοΈ Exploit | Exploitation techniques |
| πΈοΈ AD | Active Directory attacks |
| π Automation | Tooling & pipelines |
| π Reports | Methodology & documentation |
| π§ Notes | Research & study material |
π¬ Contact & Presence
- π GitHub: https://github.com/Crackerinho
- πΌ LinkedIn: https://www.linkedin.com/in/enrik-mustafa-b906873a5/
Last updated: February 2026