Skip to content
fr3akazo1d@root:~# sudo su -
Initializing root access...
Sometimes I feel like giving up, then I remember I have a lot of people to prove wrong.
fr3akazo1d avatar
fr3akazo1d@root:~#
SEC NEWS The Hacker News
Next Event: DEF CON 34 β€’ Aug 06, 2026 β€’ Las Vegas, Nevada, USA

# whoami

about.sh

fr3akazo1d@root:~# cat about.txt

Hey, I'm Phil β€” or Fr3akazo1d if you're in the right circles.
I spend my days breaking into systems to figure out how to defend them better. Red Team operations, infrastructure design, custom tooling β€” that's my thing. Coffee and Monster Energy keep me going, and there's always a HackTheBox lab running somewhere in the background.
When I'm not breaking things professionally, I'm probably breaking them at home. My Proxmox cluster (3 nodes) is constantly getting tweaked, my Wi-Fi setup has seen more changes than I can count, and yes... I've accidentally taken down the home internet more times than my wife would like. It's always DNS. Except when it's not DNS β€” then it's still DNS.
Real life? Married with two kids, a dog, and two cats. Free time is rare, but when I get it, I'm either in the homelab or playing Minecraft with my oldest son. Sometimes both.
The only device in my house with perfect uptime? The coffee machine.

Focus areas:

  • > Red Team Operations & Adversary Emulation
  • > Offensive Infrastructure (Proxmox, C2, VPN setups)
  • > Custom Tool Development & Automation
  • > Exploit Development & Reverse Engineering
  • > Continuous Learning (HackTheBox, HTB Academy, HackSmarter)
  • > Homelab Tinkering (usually breaking something)

fr3akazo1d@root:~# _

# cat /proc/skills

Offensive Security

Penetration Testing 4/5
Red Team Operations 3/5
Social Engineering 2/5
Exploit Development 2/5
Post-Exploitation 4/5
OSINT 4/5
Web Application Security 3/5
Network Security 4/5
Wireless Security 2/5
Malware Analysis 2/5
Digital Forensics 2/5
Reverse Engineering 1/5

Development & Infrastructure

Python 4/5
Bash/Shell Scripting 4/5
PowerShell 2/5
C/C++ 1/5
Rust 2/5
C# 2/5
Proxmox Virtualization 4/5
Linux Administration 5/5
Windows Active Directory 4/5
Cloud Security 3/5
Docker/Containers 4/5
Metasploit Framework 4/5
Sliver C2 4/5

# cat /var/log/career.log

04/2025 - Present

Senior Staff Engineer Offensive Security

Infineon Technologies | Carinthia | Austria
Leading red team operations and adversary emulation exercises against enterprise infrastructure. Conducting advanced penetration testing and security assessments across multiple business units. Serving as system owner of the Red Team Infrastructure, responsible for maintaining and evolving attack simulation platforms and tooling. Collaborating with blue team to enhance detection capabilities and improve overall security posture through realistic threat scenarios.

[Key Achievements]

  • Leading complex red team operations simulating advanced persistent threats (APT)
  • Developing custom offensive tools and exploits for operation-specific requirements
  • Architecting and maintaining scalable red team infrastructure supporting multiple concurrent operations
  • Mentoring junior team members in offensive security techniques and methodologies
  • Presenting findings and security recommendations to executive leadership
Sliver, Mythic, Cobalt Strike Custom Tooling (C#, Python, Go) Active Directory Exploitation Network Penetration Testing Cloud Security (Azure, AWS)
04/2024 - 03/2025

Senior Staff Specialist Offensive Security

Infineon Technologies | Carinthia | Austria
07/2022 - 03/2024

Staff Specialist Cyber-Security

Infineon Technologies | Carinthia | Austria
03/2021 - 06/2022

Cyber-Security Analyst

Atos | Carinthia | Austria
05/2017 - 02/2021

Network Engineer

Atos | Villach | Austria
08/2016 - 04/2017

Software Developer

Software Cube | Villach | Austria
07/2014 - 07/2016

Scripting & Packaging Specialist

addIT | Carinthia | Austria
08/2010 - 06/2014

Scripting & Packaging Specialist

Infineon Technologies | Carinthia | Austria
08/2001 - 07/2010

Surface Technician

Wild Austria | VΓΆlkermarkt | Austria

Certifications

GRTP
2026-01
GIAC Red Team Proffessional
GIAC Certifications
ID: 819
PT1
2025-11
Junior Penetration Tester
TryHackMe
eJPT
2021-08
Junior Penetration Tester
INE
ID: 81522452
CCNA Security
2019-10
Cisco Certified Network Associate Security
Cisco
ID: CSCO13278827
CCNA R/S
2018-05
Cisco Certified Network Associate Routing and Switching
Cisco
ID: CSCO13278827

Professional Courses

SANS SEC565
2025-10
Red Team Operations and Adversary Emulation
SANS Institute
Advanced red team tactics and adversary simulation
CRTP
2022-03
Certified Red Team Professional
Altered Security
Attacking and Defending Active Directory (Certified Red Team Professional)
DEF CON 33 Workshop
2025-08
Putting EDRs in Their Place - Killing and Silencing EDR Agents
DEF CON
Bybassing EDRs.
DEF CON 33 Workshop
2025-08
Obfuscation Reloaded - Modern Techniques for Evading Detection
DEF CON
Obfuscation code for bybassing EDRs.
DEF CON 31 Workshop
2023-08
A C2 Workshop for Modern Red Teaming
DEF CON
Obfuscation code for bybassing EDRs.

# cat blog.log

[2025-11-03] #documentation ~8 min read

Markdown Cheat Sheet - Quick Reference

Quick reference guide for Markdown syntax with examples. Because even hackers need documentation.

Read more β†’
[2025-11-02] #jekyll ~16 min read

Building My Hacker Portfolio: A Deep Technical Dive

A complete technical breakdown of how I built a cybersecurity-themed personal website from the ground up β€” Matrix rain, live RSS threat feed, visitor recon terminal, decrypt effects, a secret...

Read more β†’
[2025-10-28] #adversary-emulation ~15 min read

Building a Custom C2 Framework

A deep dive into designing modular command and control infrastructure that evades modern EDR solutions using domain fronting and encrypted channels

Read more β†’

# ls -la ~/projects

Jykell Theme

Custom Jekyll theme based on my colors and style of my F! logo

Jykyll Homepage personal
View on GitHub β†’

# curl api.github.com/fr3akazo1d-sec

GitHub avatar
fr3akazo1d-sec
Red Team Operator & Security Researcher
β€”repos β€”followers β€”following
View full profile

Recently active repositories

root@github:~# fetching repositories_

# cat /etc/contact

Let's connect and collaborate on security research, penetration testing, or cybersecurity projects.

root@security:~# Ready to discuss your next challenge