My cybersecurity journey started unexpectedly back in 2019, when I pulled off my first FRP bypass on an Android device. What seemed like a simple trick at the time turned into a turning pointβI became obsessed with understanding how systems work underneath, how protections fail, and how creative thinking can break through barriers. That moment sparked everything.
Since then, Iβve been steadily evolving from curiosity to capability. I build and share my tools and offensive experiments under adrilaw on GitHub, and I contribute to the mobile hacking community as kidpentester on XDA Developers.
A big part of my growth has come from working on MedusaPhisher, a custom script I designed to create various phishing login pages. Moreover, Iβve worked with Offensive Security on the open-source Kali NetHunter project, where Iβve explored and contributed to HID-style attack modules and custom kernel development.
Professional Identity β Adrilaw
Red Team Persona β KidPentester
Cybersecurity Analyst
Offensive Security Specialist in development
Kernel builder β’ Tool developer β’ Lab architect
I simulate real-world cyber attacks, build offensive infrastructure, and engineer controlled environments to study how modern adversaries operate inside enterprise systems.
Current Focus Areas: β Web Application Security & Recon β Linux Privilege Escalation β USB HID Attack Vectors β Bash & Python Scripting β Vulnerability Research β Building FUD Malware for testing purposes
Surfer mentality applied to red teaming: Flow | Timing | Precision | Patience | Control under pressure
I approach pentesting and red teaming the same way I approach surfing and rock βnβ roll πΈβcreative, fearless, and always pushing limits.
Security consulting environment exposure: β penetration testing reports β vulnerability analysis β risk frameworks (ISO 27001 / NIST) β enterprise security operations β red team methodology observation
β Custom Kali NetHunter kernel (Samsung J8) β HID / BadUSB attack payloads (Payload automation & reliability) β MedusaPhisher - Complex phishing framework β Command & Control experiments β Red team simulation labs
| Year | Phase | Milestone / Goal | Status |
| 2026 | Foundations | OTHM Level 5 Diploma (UK Versity) | β³ |
| 2026 | Operator | CRTP (Certified Red Team Professional) | π― APRIL 2026 |
| 2026 | Operator | CRTO (Certified Red Team Operator) | β³ |
| 2027 | Full-Stack | BSc (Hons) Top-up Enrollment | β³ |
| 2027 | Web & AI | BSCP (Burp Suite Certified) + PAPA (AI Pentesting) | β³ |
| 2027 | Full-Stack | OSCP+ (OffSec Certified Professional) | β³ |
| 2028 | Specialist | MSc Cybersecurity Enrollment | β³ |
| 2028 | Specialist | CRTE (Red Team Expert) + CRTM (Red Team Master) | β³ |
| 2029 | Advanced | HTB Certified Wireless Expert + BDO Red Team Transition | β³ |
| 2029 | Advanced | CRTL (Red Team Lead / CRTO II) | β³ |
| 2030 | Elite | MSc Graduation (Age 23) | π |
| 2030 | Elite | OSEP (OffSec Experienced Pentester) | β³ |
Pentesting Kali NetHunter Kernel building HID attacks Red team methodology Security automation
Education β’ Research β’ Authorized testing β’ Controlled environments
β Follow the evolution of a future elite red team operator.
