Skip to content
View Adrilaw's full-sized avatar
πŸ’­
Working
πŸ’­
Working

Block or report Adrilaw

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Adrilaw/README.md

⚑ Mel Adrien Lawrence Enzo Dodin | Adrilaw | KidPentester ⚑

Red Team Operator β€’ Hardware Hacker β€’ Security Researcher


πŸ“œ MY JOURNEY: THE GENESIS

My cybersecurity journey started unexpectedly back in 2019, when I pulled off my first FRP bypass on an Android device. What seemed like a simple trick at the time turned into a turning pointβ€”I became obsessed with understanding how systems work underneath, how protections fail, and how creative thinking can break through barriers. That moment sparked everything.

Since then, I’ve been steadily evolving from curiosity to capability. I build and share my tools and offensive experiments under adrilaw on GitHub, and I contribute to the mobile hacking community as kidpentester on XDA Developers.

A big part of my growth has come from working on MedusaPhisher, a custom script I designed to create various phishing login pages. Moreover, I’ve worked with Offensive Security on the open-source Kali NetHunter project, where I’ve explored and contributed to HID-style attack modules and custom kernel development.


🧬 OPERATOR IDENTITY

Role Status Specialty

Professional Identity β†’ Adrilaw

Red Team Persona β†’ KidPentester

Cybersecurity Analyst

Offensive Security Specialist in development

Kernel builder β€’ Tool developer β€’ Lab architect


🧠 ABOUT ME

Mindset

I simulate real-world cyber attacks, build offensive infrastructure, and engineer controlled environments to study how modern adversaries operate inside enterprise systems.

Current Focus Areas: βœ” Web Application Security & Recon βœ” Linux Privilege Escalation βœ” USB HID Attack Vectors βœ” Bash & Python Scripting βœ” Vulnerability Research βœ” Building FUD Malware for testing purposes


πŸ„ LIFE PHILOSOPHY

Surf

Surfer mentality applied to red teaming: Flow | Timing | Precision | Patience | Control under pressure

I approach pentesting and red teaming the same way I approach surfing and rock ’n’ roll πŸŽΈβ€”creative, fearless, and always pushing limits.


πŸ’Ό PROFESSIONAL EXPERIENCE

Work

Security consulting environment exposure: βœ” penetration testing reports βœ” vulnerability analysis βœ” risk frameworks (ISO 27001 / NIST) βœ” enterprise security operations βœ” red team methodology observation


πŸ”§ MAJOR TECHNICAL PROJECTS

Build

βœ” Custom Kali NetHunter kernel (Samsung J8) βœ” HID / BadUSB attack payloads (Payload automation & reliability) βœ” MedusaPhisher - Complex phishing framework βœ” Command & Control experiments βœ” Red team simulation labs


πŸ›  TECH STACK (OPERATIONAL)

πŸ’» Systems & Mobile Hacking

βš™οΈ Scripting & Development


πŸ›‘οΈ Red Team Roadmap: The "Kidpentester" Path (2026-2030)

| Year | Phase | Milestone / Goal | Status |

| 2026 | Foundations | OTHM Level 5 Diploma (UK Versity) | ⏳ |

| 2026 | Operator | CRTP (Certified Red Team Professional) | 🎯 APRIL 2026 |

| 2026 | Operator | CRTO (Certified Red Team Operator) | ⏳ |

| 2027 | Full-Stack | BSc (Hons) Top-up Enrollment | ⏳ |

| 2027 | Web & AI | BSCP (Burp Suite Certified) + PAPA (AI Pentesting) | ⏳ |

| 2027 | Full-Stack | OSCP+ (OffSec Certified Professional) | ⏳ |

| 2028 | Specialist | MSc Cybersecurity Enrollment | ⏳ |

| 2028 | Specialist | CRTE (Red Team Expert) + CRTM (Red Team Master) | ⏳ |

| 2029 | Advanced | HTB Certified Wireless Expert + BDO Red Team Transition | ⏳ |

| 2029 | Advanced | CRTL (Red Team Lead / CRTO II) | ⏳ |

| 2030 | Elite | MSc Graduation (Age 23) | πŸŽ“ |

| 2030 | Elite | OSEP (OffSec Experienced Pentester) | ⏳ |


πŸ“Š OPERATOR METRICS


πŸ’¬ ASK ME ABOUT

Pentesting Kali NetHunter Kernel building HID attacks Red team methodology Security automation


⚠️ ETHICAL DIRECTIVE

Ethics

Education β€’ Research β€’ Authorized testing β€’ Controlled environments


⭐ Follow the evolution of a future elite red team operator.

Popular repositories Loading

  1. MedusaPhisher MedusaPhisher Public

    Phishing tool script which generate phishing websites with a link to send to victim, the link genrated comes together with a QR code.Medusa Phisher helps pentesters to evaluate how well employees r…

    HTML 166 43

  2. OdinV4 OdinV4 Public

    OFFICIAL Samsung Odin v4 1.2.1 - For Linux

    166 14

  3. PhantomShell PhantomShell Public

    PowerShell reverse-shell payload generator engineered to bypass Windows Defender and AMSI.

    Python 19 2

  4. DuckHunter_HID_Scripts DuckHunter_HID_Scripts Public

    Ready made ducky scripts to use in nethunter Duckhunter HID attack to perform bad usb attack right at your fingertips.

    13 1

  5. ELIANA-Remote-Access-Trojan ELIANA-Remote-Access-Trojan Public

    An AI generated lightweight Python + Telegram C2 tool built for authorized VAPT engagements . It allows security testers with proper permission to remotely run approved commands, gather system inf…

    Python 10 1

  6. Digispark_DuckyScripts Digispark_DuckyScripts Public

    Transform your Digispark into a powerful keystroke injection tool! This repo provides scripts and guides for using your Digispark as a Rubber Ducky device, perfect for automation and security testi…

    C++ 6