<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>forbiddenport</title><link>https://forbiddenport.com/</link><description>Recent content on forbiddenport</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Mon, 20 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://forbiddenport.com/index.xml" rel="self" type="application/rss+xml"/><item><title>SharpSocks</title><link>https://forbiddenport.com/projects/sharpsocks/</link><pubDate>Mon, 20 Apr 2026 00:00:00 +0000</pubDate><guid>https://forbiddenport.com/projects/sharpsocks/</guid><description>Reverse SOCKS5 proxy for offensive security. C# agent connects out to a Go server exposing a local SOCKS5 listener. AES-256 + HMAC, optional TLS wrapping.</description></item><item><title>About</title><link>https://forbiddenport.com/about/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://forbiddenport.com/about/</guid><description>&lt;p&gt;I&amp;rsquo;m an offensive security specialist focused on adversary emulation, attack surface analysis, and exploitation of complex enterprise environments.&lt;/p&gt;
&lt;h2 id="what-i-actually-do"&gt;What I actually do&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Offensive security engagements&lt;/strong&gt; - Web applications and APIs, infrastructure, Active Directory, cloud, and hybrid environments.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Vulnerability research&lt;/strong&gt; - Open-source and closed-source software.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Tooling development&lt;/strong&gt; - Building and adapting custom tooling for reconnaissance, initial access, lateral movement, and operational persistence.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Red team infrastructure&lt;/strong&gt; - Designing and operating C2 infrastructure, redirectors, domain fronting, and malleable communication profiles for covert operations.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Hardware &amp;amp; embedded systems&lt;/strong&gt; - Reverse engineering and security analysis of ATMs, PoS terminals, and IoT devices, including firmware extraction and UART/JTAG-based debugging.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Homelab&lt;/strong&gt; - Configuring and maintaining a personal lab environment with varied network setups, stacks, virtualization software, and hardened configurations.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="my-experience"&gt;My experience&lt;/h2&gt;
&lt;p&gt;Over 8 years of multi-domain offensive security experience across consulting and tech, as a senior tester, team lead, and primary client contact. Delivered assessments across government, finance, healthcare, energy, telecom, retail, and critical infrastructure.&lt;/p&gt;</description></item></channel></rss>