Skip to content
View B-star51's full-sized avatar

Block or report B-star51

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
B-star51/README.md
 ██████╗██╗   ██╗██████╗ ███████╗██████╗  █████╗  ██╗███████╗██╗  ██╗
██╔════╝╚██╗ ██╔╝██╔══██╗██╔════╝██╔══██╗██╔══██╗███║██╔════╝╚██╗██╔╝
██║      ╚████╔╝ ██████╔╝█████╗  ██████╔╝███████║╚██║█████╗   ╚███╔╝ 
██║       ╚██╔╝  ██╔══██╗██╔══╝  ██╔══██╗██╔══██║ ██║██╔══╝   ██╔██╗ 
╚██████╗   ██║   ██████╔╝███████╗██║  ██║██║  ██║ ██║███████╗██╔╝ ██╗
 ╚═════╝   ╚═╝   ╚═════╝ ╚══════╝╚═╝  ╚═╝╚═╝  ╚═╝ ╚═╝╚══════╝╚═╝  ╚═╝

[ Penetration Tester | AD Exploitation | Web App Security | Top 1% TryHackMe ]

TryHackMe LinkedIn Discord OSCP


🎯 Who I Am

I'm a penetration tester focused on Active Directory exploitation, web application security, and network assessments. I don't read about attack techniques — I build the environments, run the attacks, and write the reports.

  • 🏆 Top 1% globally on TryHackMe — ranked against tens of thousands of active practitioners
  • 🏗️ Built a Proxmox enterprise AD lab — full kill chains from initial access to domain compromise
  • 🧰 Currently building Codex-Jinx — a personal dashboard to wrangle recon notes, exploit logs, and assessment tracking (because sticky notes don't scale)
  • 📋 Produce written pentest reports with CVSS-scored findings and remediation — not just screenshots
  • 🎓 Trained across TryHackMe · HackingHub · HackSmarter · WebSploit Labs · OWASP Juice Shop and Omar Santos' Art of Hacking (26+ hrs, OSCP-aligned)
  • 📜 CompTIA Security+ · Network+ · ISC2 CC · Cisco Ethical Hacker · TryHackMe Jr. Penetration Tester (PT1) → pushing toward OSCP

⚔️ Offensive Security Toolkit

The tools I actually use in lab work and assessments

Exploitation & Active Directory

Metasploit Mimikatz Impacket BloodHound

Web Application

Burp Suite SQLmap OWASP

Reconnaissance & Cracking

Nmap Gobuster Hashcat Hydra Wireshark


💻 Scripting, Infrastructure & OS

Languages & Scripting

Python Bash Script Zsh PowerShell MySQL JavaScript Markdown

Infrastructure & Tools

Docker Raspberry Pi TOR Systemd Windows Terminal

Operating Systems

Kali Linux Linux Ubuntu Debian Arch Linux Manjaro Fedora GNOME XFCE


🏗️ Lab & Projects

Project Description Stack
AD Attack Lab Multi-domain Proxmox environment — Kerberoasting, Pass-the-Hash, BloodHound attack path mapping, lateral movement end-to-end Proxmox · Windows Server · Kali
Codex-Jinx Personal ops dashboard — recon notes, exploit logs, and assessment tracking. Built because sticky notes don't scale. JavaScript · Python
WebSploit Practice 500+ exercises across Juice Shop, WebGoat, DVWA and custom Omar Santos labs targeting SQLi, SSRF, deserialization, GraphQL Docker · Burp Suite · Kali
Pentest Reports Structured assessment write-ups with CVSS scoring and remediation recommendations — mirroring real client deliverables Markdown

📊 TryHackMe

TryHackMe Badge


📈 GitHub Stats

GitHub Stats

Streak Stats

Top Languages


💬 Words to Hack By

"The quieter you become, the more you are able to hear." — Kali Linux

"Hackers are breaking the systems for profit. Before, it was about intellectual curiosity and the pursuit of knowledge." — Kevin Mitnick

"The only truly secure system is one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards." — Gene Spafford

"Security is always excessive until it's not enough." — Robbie Sinclair

"In security, the first thing you have to do is enumerate." — every pentester ever

Dev Quote


> Currently: enum → exploit → escalate → report → repeat

Open to junior penetration tester roles and red team internships | South Africa | Remote-ready

Popular repositories Loading

  1. dufo.save dufo.save Public

    A Bash script designed to automate Linux privilege escalation reconnaissance by gathering key system information

    Shell 3

  2. codex-jinx codex-jinx Public

    "Codex Jinx is a curated playbook for aspiring pentesters and CTF enthusiasts. Packed with checklists, tips, and techniques, it guides you from recon to privilege escalation in a legal, educational…

    JavaScript 2

  3. B-star51 B-star51 Public

  4. Voyage_tryhackme_Writeup Voyage_tryhackme_Writeup Public

    Voyage is a CTF challenge focused on chaining multiple vulnerabilities to achieve full system compromise.