Skip to content
View vimalraj-sec's full-sized avatar
😅
Focusing
😅
Focusing

Block or report vimalraj-sec

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
vimalraj-sec/README.md

Vimal Raj M

Offensive Security Professional · OSCP+ Certified · Chennai, India

LinkedIn Email Status

👋 Who I Am

I'm an offensive security professional based in Chennai, India, specialising in penetration testing, Active Directory attacks, web application security, and privilege escalation.

I started my career in information security in 2017 at Iopex Technologies, then moved to Infosys Ltd. In 2019, a serious family medical crisis required me to step away from formal employment to become the primary caregiver and manage our family business full-time.

I never let go of cybersecurity. While managing those responsibilities, I kept studying — methodically and consistently. I saved money specifically to self-fund my OSCP+ preparation, built 2,600+ structured personal notes, completed 80+ full machine exploitation chains, and passed the OSCP+ examination in November 2025.

I'm not a career changer. I'm a security professional who faced a hard chapter, never walked away from the field, and came back with proof.

💼 Actively seeking Penetration Tester / VAPT Consultant roles — open to Chennai, remote, and international relocation with sponsorship.


🏆 Certifications

Certification Issuer Year
OSCP+ — Offensive Security Certified Professional Plus OffSec Nov 2025
ECSA v9 — EC-Council Certified Security Analyst EC-Council 2018

💼 Professional Background

Period Role Organisation
Jul 2017 – Aug 2018 Trainee Information Security Specialist Iopex Technologies
Sep 2018 – Mar 2019 Information Security Engineer Infosys Ltd
Apr 2019 – Oct 2025 Independent Security Research & Professional Development Self-directed

During the independent research period:

  • Completed 80+ full machine exploitation chains across OffSec Proving Grounds and TryHackMe — each documented end-to-end
  • Compiled 2,600+ structured personal notes into a public penetration testing reference across 12 attack categories
  • Built a custom local Active Directory lab (DC01 Windows Server 2025 + MS01 + MS02 Windows 11) for hands-on AD attack practice
  • Earned OSCP+ — a 24-hour hands-on practical examination with no multiple-choice elements and no partial credit

📂 Featured Repositories

Complete Active Directory penetration testing reference — full attack chain from zero credentials to Domain Admin, built from real lab practice across HTB, TryHackMe, and a custom local AD lab.

Phase Coverage
🔍 Recon DC identification, port scanning, SMB fingerprinting
🗂️ Domain Enumeration Kerbrute, ldapdomaindump, RID brute, BloodHound — with and without creds
🔑 Credential Attacks AS-REP Roasting, Kerberoasting, Password Spray, Responder
🔀 Lateral Movement Pass-the-Hash, Overpass-the-Hash, Evil-WinRM, RDP, PSExec
⬆️ Privilege Escalation BloodHound paths, ACL abuse, ADCS / Certipy (ESC1/ESC4)
👑 Domain Dominance DCSync, Golden Ticket, Silver Ticket, NTDS dump

Also includes:

  • Machine writeups — HTB Forest, Active, Sauna · THM Attacktive Directory, Enterprise
  • Custom Python scripts — BloodHound collector, safe password spray tool
  • Full local lab setup — DC01 (Windows Server 2025) + MS01 + MS02 (Windows 11)
  • MITRE ATT&CK mapped throughout

Complete web application penetration testing reference — methodology-driven, aligned with OWASP Top 10:2025 including both new categories added this cycle.

# Section Coverage
00 🗺️ Methodology Full engagement workflow — 6 phases, Burp setup, notes format
01 🔍 Recon & Enumeration Subdomain enum, dir busting, JS analysis, Nikto, Nuclei
02 🔐 Authentication Testing Brute force, MFA bypass, JWT attacks, session management
03 🚪 Broken Access Control IDOR, SSRF + cloud metadata, CORS, path traversal — A01:2025
04 💉 Injection Attacks SQLi, CMDi, SSTI, XXE, LFI/RFI, NoSQLi — A04:2025
05 🖥️ XSS & Client-Side Reflected, Stored, DOM XSS, CSRF, Clickjacking, Open Redirect
06 ⚙️ Security Misconfiguration Headers, Spring Actuator, cloud storage, HTTP methods — A02:2025
07 🔒 Cryptographic Failures Weak hashing, hardcoded secrets, insecure transmission
08 🏗️ Insecure Design Business logic flaws, race conditions, workflow bypass — A05:2025
09 📦 Software Supply Chain Vulnerable components, exposed .git, SRI checks — A03:2025 NEW
10 ✅ Software & Data Integrity Insecure deserialization — Java, PHP, Python pickle — A08:2025
11 📋 Logging & Alerting Log testing, log injection, detection gap evidence — A09:2025
12 ⚠️ Exceptional Conditions Fail-open, verbose errors, ReDoS, resource exhaustion — A10:2025 NEW
13 🔌 API Testing BOLA, BFLA, mass assignment, GraphQL, rate limiting
14 📁 File Upload Attacks Extension bypass, polyglot, zip slip, SVG XXE, webshell
15 🛠️ Tools & Wordlists Burp, ffuf, sqlmap, nuclei, jwt_tool — all commands in one place
16 📝 Report Templates Client-facing finding format, CVSS vectors, severity justification

80+ OSCP-style machine writeups — full exploitation chains from enumeration to root/SYSTEM proof.

Platform Category Machines
TryHackMe Active Directory 5
TryHackMe Windows 12
TryHackMe Linux 17
OffSec Proving Grounds Play 9
OffSec Proving Grounds Practice 34+

Every writeup follows a strict methodology:

Enumeration → Service Analysis → Initial Access → Privilege Escalation → Proof

A complete offensive security reference — compiled from 2,600+ personal notes during OSCP preparation. Structured for real engagement use, not just exam revision.

# Section Coverage
00 🐚 Shells & File Transfer Reverse shells, shell upgrades, Linux/Windows file transfer
01 🔍 Reconnaissance Nmap, Rustscan, web fingerprinting, environment setup
02 🔌 Port Enumeration Every port 21 → 27017 with attack commands
03 🌐 Web Attacks SQLi, LFI, SSTI, file upload bypass, CMS, XSS, RFI
04 🪟 Windows Enumeration Post-shell enum, credential harvesting, quick wins
05 🐧 Linux Enumeration System, users, network, process, file enumeration
06 ⬆️ Windows PrivEsc Services, registry, tokens, UAC bypass, Mimikatz
07 ⬆️ Linux PrivEsc SUID, sudo, cron, Docker, UDF, wildcard abuse
08 🏢 Active Directory AS-REP Roasting, Kerberoasting, BloodHound, ADCS, PTH
09 🔀 Pivoting Ligolo-ng, Chisel, SSH tunnels, netsh port forwarding
10 🛠️ Tools Reference Hydra, ffuf, sqlmap, hashcat, msfvenom, netexec
11 ✅ Exam Checklists Initial access, web, Windows/Linux privesc, AD attack chains

🛠️ Technical Skills

Exploitation & Enumeration Nmap Rustscan Burp Suite ffuf Gobuster Feroxbuster Metasploit msfvenom

Active Directory BloodHound Impacket Netexec Rubeus Mimikatz Evil-WinRM Certipy

Web Application Security SQLi SSTI XXE LFI/RFI File Upload Bypass JWT Attacks IDOR SSRF OWASP Top 10:2025

API Security BOLA BFLA Mass Assignment GraphQL Testing REST API Testing

Vulnerability Management Nessus Qualys CVSS Scoring CIS Benchmark (L1/L2) Remediation Reporting

Privilege Escalation WinPEAS LinPEAS GTFOBins LOLBAS

Pivoting & Tunnelling Ligolo-ng Chisel SSH Port Forwarding netsh

Password Attacks Hashcat John the Ripper Hydra CrackMapExec

Scripting Python Bash PowerShell

Platforms Kali Linux OffSec Proving Grounds TryHackMe HackTheBox


🧠 Attack Methodology

TARGET
  │
  ├─ 01. RECON ──────────── nmap / rustscan → open ports + service versions
  │
  ├─ 02. ENUMERATE SERVICES
  │      ├─ SMB 445 ──────── null session → shares → RID brute → hashes
  │      ├─ HTTP 80/443 ─── whatweb → dir bust → app fingerprint
  │      ├─ SSH 22 ─────────  key enum / brute
  │      ├─ MSSQL 1433 ───── xp_cmdshell
  │      ├─ NFS 2049 ──────── showmount → no_root_squash
  │      ├─ LDAP 389 ──────── anonymous dump → users
  │      └─ SNMP 161 ──────── community string → info leak
  │
  ├─ 03. WEB ATTACKS (if HTTP)
  │      ├─ Dir bust → ffuf / gobuster / feroxbuster
  │      ├─ SQLi → sqlmap / manual
  │      ├─ LFI → log poisoning / php wrappers
  │      ├─ File upload bypass → webshell
  │      ├─ SSTI → RCE
  │      ├─ API → BOLA / BFLA / mass assignment
  │      └─ CMS → wpscan / joomscan / droopescan
  │
  ├─ 04. POST-EXPLOITATION
  │      ├─ [Linux]   linpeas → sudo -l → SUID → cron → writable files → ROOT
  │      ├─ [Windows] winpeas → whoami /priv → services → SeImpersonate → SYSTEM
  │      └─ [AD]      BloodHound → Kerberoast / AS-REP → ADCS → PTH → Domain Admin
  │
  └─ 05. PIVOT (if multi-network)
         └─ Ligolo-ng → new subnet → repeat from step 01

📬 Connect

I'm actively looking for Penetration Tester / VAPT Consultant roles — open to Chennai, remote, and international relocation with sponsorship. If you're a recruiter or hiring manager, feel free to reach out directly.

LinkedIn Email


⚠️ All content in these repositories is for authorised security testing and educational purposes only.

Pinned Loading

  1. penetration-testing-writeups penetration-testing-writeups Public

    OSCP-style machine writeups — full exploitation chains from enumeration to root/SYSTEM across OffSec Proving Grounds and TryHackMe.

  2. active-directory-pentesting active-directory-pentesting Public

    Complete AD penetration testing reference — zero credentials to Domain Admin, with MITRE ATT&CK mapping, custom Python tools, and a full local lab setup.

    Python

  3. pentest-cheatsheet pentest-cheatsheet Public

    Offensive security reference compiled from 2,600+ personal OSCP prep notes — 12 sections covering the full attack chain from recon to domain compromise.

  4. web-app-pentesting web-app-pentesting Public

    Complete web application penetration testing reference — OWASP Top 10:2025 aligned, covering injection, access control, API security, file upload attacks, and client-side exploits.

    1