// Penetration Tester  |  Red Team Operator

DAVID MILOV
OFFENSIVE SECURITY

Red Team  ·  Exploit Dev  ·  Cloud Ops

~4 years of offensive security experience. Specializing in offensive tooling and low level research.

STATUS: ACTIVE
LOCATION: IL / REMOTE
[ ]

Operations

OP-001
FogJack
Offensive Framework  ·  Python

Modular Python-based offensive security framework built for Kali Linux. Covers network scanning, vulnerability flagging, and post exploitation capabilities. Expanding into cloud misconfiguration exploitation across AWS, Azure, and GCP.

Python Network Scanning Post Exploitation Cloud Abuse AWS Azure GCP Kali Linux

Capabilities

Reverse Engineering
Static Analysis
Dynamic Analysis
Binary Exploitation
Stack Buffer Overflow
Kernel Research
Malware Development
AV / EDR Evasion
Initial Access
Post Exploitation
Shellcode Injection
Programming
Python
C / C++
Bash / Shell
Current Projects
FogJack
Offensive Framework
⟳ Active Dev
Kernel Research
Binary Exploitation
⟳ Active
CySA+
CompTIA
⟳ In Progress
B.S. Cyber
WGU
⟳ In Progress
Toolset
Kali Linux PwnTools Metasploit Nmap Sliver C2 Burp Suite Wireshark BloodHound Impacket GDB / PEDA Ghidra MITRE ATT&CK Docker

Certifications


Intel File

I'm a red teamer with ~4 years of hands-on red team experience, currently completing a B.S. in Cybersecurity at WGU. My work lives at the intersection of offensive tooling, adversary simulation, and practical exploit development.

Beyond the technical, I'm passionate about researching cognitive science and how it can be applied to absorb information faster and more effectively. I also enjoy learning languages, currently working across Hebrew, Arabic, and reviving the language of my diaspora, Bukhori.

Currently focused on: expanding my low level C/C++ capabilities, improving efficiency in cyber operations, and advanced cloud attack surface research.

// Subject File
ROLERed Teamer
EXP~4 Years Red Team
STATUSActive Operator
EDUCATIONWGU B.S. Cyber
PLATFORMHackTheBox
LANGUAGESEN · HE · AR · RU · Bukhori
LOCATIONIsrael

Establish Comms

// GitHub
github.com/dcodes1
Source code & projects
// LinkedIn
davidgmilov
Professional network
// TryHackMe
TryHackMe Profile
// Email
[email protected]
For inquiries