class NodirSafarov:
def __init__(self):
self.role = "Junior Penetration Tester"
self.location = "Tashkent, Uzbekistan"
self.focus = ["Web Application Security", "Active Directory", "Red Team Ops"]
self.methodology = ["OWASP Top 10", "PTES", "MITRE ATT&CK"]
self.platforms = ["HackTheBox", "TryHackMe", "PortSwigger Web Security Academy"]
self.languages = ["Uzbek", "Tajik", "English (B1)"]
self.open_to = "Junior Pentester / Red Team Analyst roles"
def daily_routine(self):
return ["Hack lab machines", "Read CVE writeups", "Practice on PortSwigger", "Build payloads"]
def motto(self):
return "Defenders think in lists, attackers think in graphs."| Repo | What |
|---|---|
adenum |
Active Directory universal enumerator — staged recon (IP → domain → users → creds), native AS-REP roasting, BloodHound auto-collection, MSSQL/WinRM/coercion checks, standalone HTML reports |
cybersecurity-notes |
Personal knowledge base — PTES web pentest cheatsheet, OWASP Top 10, Active Directory, Red Team |
pentest-roadmap |
Practical zero-to-pentest roadmap — recon → exploitation → post-exploitation → reporting + curated resources & cheat sheets |
offensive-security-methodology |
Per-phase methodology playbook — recon, exploitation, post-exploitation, Active Directory, cloud, reporting |
🚧 Continuously growing. New machines solved, new payloads tested, new tools written — everything ends up here.
| # | Vulnerability | Practice |
|---|---|---|
| A01 | Broken Access Control | PortSwigger Labs · HTB Web |
| A02 | Cryptographic Failures | TryHackMe Crypto rooms |
| A03 | Injection (SQLi / NoSQLi / Command) | Manual + SQLmap, HTB Boxes |
| A04 | Insecure Design | Threat modeling exercises |
| A05 | Security Misconfiguration | Burp Suite scans, lab work |
| A06 | Vulnerable & Outdated Components | CVE research, Nuclei templates |
| A07 | Auth & Session Failures | JWT abuse, session fixation labs |
| A08 | Software & Data Integrity Failures | CI/CD security reading |
| A09 | Logging & Monitoring Failures | Defensive context studies |
| A10 | SSRF | PortSwigger SSRF labs, HTB |
# Reconnaissance & Enumeration
nmap -sC -sV -p- target.htb
ldapsearch / rpcclient / smbclient
bloodhound-python -d corp.local -u user -p 'pass' -c All
# Initial Access
responder -I tun0
crackmapexec smb 10.10.10.0/24 -u users.txt -p 'Password1'
# Privilege Escalation
GetNPUsers.py -no-pass -usersfile users.txt corp.local/
GetUserSPNs.py -request corp.local/lowpriv:'pass'
# Lateral Movement & Domain Compromise
psexec.py / wmiexec.py / smbexec.py
secretsdump.py -just-dc corp.local/admin@dc01- Mastering Active Directory attack chains end-to-end
- PortSwigger Web Security Academy advanced labs
- Building a personal pentest methodology playbook
- Studying for OSCP / eJPT / CRTP
- Custom Python tooling for AD recon —
adenumshipped - HackTheBox machines — focus on Web and AD