Red Team and Offensive Security · Toronto

Red team operator. Break it, explain it, help fix it.

Run red team operations and purple team exercises for enterprise clients in financial services. Active Directory, Entra ID, EDR evasion, C2 infrastructure, social engineering. Lead engagements end to end and make sure findings actually strengthen the organization, not just prove a point.

120+
Validated vulnerabilities
30+
Engagements delivered
5+
Years in offensive security
4
Conference talks
What I Do

Red team operations and purple team exercises for enterprise clients, mostly in financial services. The work is scenario driven: scope an objective, build the attack path, execute against production with real EDR deployed, and report what worked and what the defenders missed.

Most of my engagements involve Active Directory and Entra ID environments. Lateral movement, privilege escalation, trust abuse, the full chain to domain compromise. When the SOC catches me, the engagement shifts to purple team and we work together to close the gap.

On HackerOne, 120+ validated vulnerabilities on companies like PayPal, Sony, AT&T, and Airbnb. That research keeps the tradecraft sharp outside of scoped engagements.

How I Operate
01

Recon drives the operation

OSINT, threat intel, target profiling. Understand who would actually attack this organization, how they would do it, and what they would go after. The attack plan follows from that.

02

Operate like the threat

Evade the EDR, build the C2, move laterally, escalate. Use real attacker TTPs in production. If the engagement does not feel real, the findings will not either.

03

Strengthen, do not embarrass

The point is better controls, not a gotcha. When detected, pivot to purple team. When reporting, explain what the SOC should look for next time. Make the org stronger.

Where I Have Worked
White Tuque, Offensive Security Specialist
Toronto · Oct 2024 to Present
Red team and purple team for enterprise financial services clients. AD and Entra ID attacks, EDR evasion (CrowdStrike, MDE, SentinelOne), C2 infrastructure, social engineering campaigns. Lead engagements end to end. Build offensive tooling in Python and Go. Mentor junior operators. Recognized by the Ontario Provincial Parliament for protecting critical digital infrastructure.
ASEC (team joined White Tuque), Penetration Tester
Toronto · May 2024 to Oct 2024
Offensive assessments for fintech and insurance. External pentests, AD enumeration, web and API testing. 150+ vulnerabilities. Built automation that cut manual effort by 40%.
HackerOne, Security Researcher
Remote · Feb 2022 to Present
120+ validated vulnerabilities on PayPal, Sony, AT&T, Airbnb, Booking.com. Multi step chains, full PoCs, root cause analysis.
Tooling
Custom C2 Components
Python, Go · Internal
Beacon deployment, covert channels, DNS exfiltration, persistence. Built to bypass modern EDR in production financial services environments.
Red Team Automation
Python, Bash, PowerShell · Internal
OSINT pipeline, credential harvesting, phishing infra setup, post exploitation. Used across financial services engagements.
API Authentication Checker
Burp Suite Extension · Open Source
Auth bypass and privilege escalation testing at scale.
View on GitHub
GraphQL SDL Generator
Python · Open Source
Schema reconstruction from introspection for attack surface mapping.
View on GitHub
Speaking and Community
SecTor 2025
Toronto
Red teaming smart buildings. How physical security and IoT attack surfaces intersect with enterprise networks.
DEF CON Vancouver
Microsoft
API attack chains and auth exploitation in production applications.
DEF CON Toronto (DC416)
Co organizer
Run Toronto's DEF CON group. Monthly meetups, workshops, red team talks.
TASK Toronto
Organizing committee
Toronto's Application Security and Knowledge conference.
Tools and Stack

Red Team: Cobalt Strike, Sliver, Nighthawk C2, Bloodhound, custom C2 tooling
Testing: Burp Suite Pro, Nuclei, Metasploit, Nmap, Wireshark
Languages: Python, Go, Bash, PowerShell, C, C++, Rust
Platforms: Windows AD, Entra ID, Windows OS, macOS, Linux, AWS, Azure
Frameworks: MITRE ATT&CK, OWASP Top 10, NIST, PTES, CVSS

Lets connect.

Red team operator who leads engagements end to end and makes organizations stronger.