chhaynee@portfolio:~$ whoami Seak Chhaynee — Offensive Security | Red Team & Penetration Tester chhaynee@portfolio:~$ bio Senior-year cybersecurity student and offensive security practitioner with hands-on experience in red team exercises, malware analysis (static & dynamic), and web application penetration testing. chhaynee@portfolio:~$ focus Adversary simulation, attack-chain analysis, exploitation fundamentals, and realistic security testing through labs, and CTFs. chhaynee@portfolio:~$ mission Understand how systems fail in real attacks and help organizations improve their defensive posture through offensive security. chhaynee@portfolio:~$ status Always learning. Always improving. Always building.
Offensive security practitioner with hands-on experience in red team exercises, malware analysis (static & dynamic), and web application penetration testing. Strong background in CTF competitions, exploit development fundamentals, and adversary simulation. Experienced in analyzing real-world attack techniques, documenting findings, and communicating technical risk clearly. Actively developing red team tradecraft and offensive research capabilities.
Practical red team exercises performed during internship, simulating real-world attack chains including reconnaissance, malware analysis, payload customization, attacker-controlled service hosting, and reverse shell establishment. Focused on understanding attacker workflow, victim compromise process, and post-exploitation capabilities in a controlled lab environment.
Hands-on analysis of Windows malware samples using static and dynamic techniques to identify execution flow, persistence mechanisms, and C2 behavior.
Forensic investigation of a Windows system image to identify unauthorized access, data exfiltration attempts, and user activity artifacts.
Analyzed 2013 Italian-UK BGP hijacking incident using OSINT, and routing data analysis. Utilized bash scripting to parse network data and trace malicious routing path.