About

About

πŸ‘‹ Hi, I’m Enrik

I’m a cybersecurity practitioner focused on offensive security, automation, and red team operations.

This site is my technical journal β€” where I document labs, tooling, and workflows used in penetration testing and adversary simulation.

Everything here is built through practice, experimentation, and continuous learning.


πŸ›‘οΈ Areas of Focus

πŸ”΄ Offensive Security

  • Network & web penetration testing
  • Internal & external assessments
  • Privilege escalation & lateral movement
  • Active Directory attacks
  • Post-exploitation workflows

πŸ§ͺ Labs & Practice

Most of my learning happens through practical environments and self-built labs.

I regularly work on:

  • TryHackMe and similar training platforms
  • Active Directory lab environments
  • Pivoting and tunneling scenarios
  • Internal network enumeration
  • Tool testing and workflow validation

I use these labs to test techniques and improve automation.


πŸš€ Core Projects

πŸ“Œ ATLAS β€” Automated Target Logging & Scanning

A deterministic reconnaissance and execution engine designed for structured security testing.

Key features:

  • Tool orchestration via templates
  • Rule-based routing
  • Reproducible assessments
  • Headless operation

πŸ“š Learning & Training

I actively train through:

  • πŸ΄β€β˜ οΈ Capture The Flag (CTF) platforms
  • Realistic attack labs

Current focus:

  • Active Directory attacks
  • Evasion techniques
  • Red team infrastructure

Skill is built in labs β€” not in theory.


πŸ—‚οΈ What You’ll Find on This Site

SectionContent
πŸ” ReconEnumeration & discovery workflows
βš”οΈ ExploitExploitation techniques
πŸ•ΈοΈ ADActive Directory attacks
πŸ” AutomationTooling & pipelines
πŸ“„ ReportsMethodology & documentation
🧠 NotesResearch & study material

πŸ“¬ Contact & Presence

  • πŸ™ GitHub: https://github.com/Crackerinho
  • πŸ’Ό LinkedIn: https://www.linkedin.com/in/enrik-mustafa-b906873a5/

Last updated: February 2026