ctxzero

I'm

Penetration Tester & Red Teamer

Web Application, Network & Active Directory Penetration Testing

About Me

Hello! I'm ctxzero

19 years old — based in Germany

Focused on Penetration Testing & Red Teaming in WebApp, Network & AD environments. Continuous learner, delivering deep, actionable insights.

Approach: Responsible disclosure, thorough reporting, pragmatic remediation advice.

Quick Info

Languages: English / German

Availability: Mon–Fri 8am – 10pm UTC+1

Contact: ctxzero.pentest@gmail.com

My Skills

Core capabilities across offensive security domains — presented with clarity.

Penetration Testing

CTF player • Active learner • From Network, WebApp to Active Directory. Professional penetration tests to ensure your infrastructure is secure and resilient.

Red Teaming

Simulating real-world adversaries to strengthen defenses, improve detection and response, and validate security controls under pressure.

Scripting

Bash • Python • Shell scripting for automation, tooling and small exploitation helpers.

Professional Methodology

From reconnaissance and enumeration to exploitation and lateral movement — I provide thorough methodology that yields deep, verifiable results and clear remediation paths.

Tool Skills

Very good knowledge of most of the Security & Offensive Security Tools.

My Certifications

  • iNE eJPT (Junior Penetration Tester)
  • Multiple TryHackMe Certifications
  • HTB CPTS (soon)

My Projects

Selected findings and write-ups demonstrating methodology and impact.

SQL Injection — Auth Bypass

Found an injectable endpoint allowing login bypass via crafted payloads. Provided PoC and patch recommendations.

Broken Authorization — IDOR

Endpoint permitted resource access by changing numeric IDs; sensitive data exposure. Reported with reproduction steps.

AD: Privilege Escalation

Identified misconfigured ACLs enabling Kerberoasting and lateral movement. Included remediation and detection advice.

Open S3 Buckets — Data Exposure

Publicly accessible storage with sensitive files — automated enumeration and cleanup guidance included.

Lets Connect

Contact me for engagements, responsible disclosure or collaboration.

Email
Reach out via GitHub / TryHackMe / Discord (links in header)