Adrilaw (Mel-Adrien Dodin) · GitHub
Skip to content
View Adrilaw's full-sized avatar
💭
Working
💭
Working

Block or report Adrilaw

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Adrilaw/README.md

⚡ Adrien Dodin | Adrilaw | KidPentester⚡

Red Team Operator • Hardware Hacker • Security Researcher


🧬 OPERATOR IDENTITY

Role Status Specialty

Professional Identity → Adrilaw

Red Team Persona → KidPentester

Cybersecurity Analyst

Offensive Security Specialist in development

Kernel builder • Tool developer • Lab architect


🧠 ABOUT ME

Mindset

I simulate real-world cyber attacks, build offensive infrastructure, and engineer controlled environments to study how modern adversaries operate inside enterprise systems.

Core disciplines:

✔ Penetration testing methodology

✔ Hardware exploitation

✔ Command & Control infrastructure

✔ Detection evasion

✔ Privilege escalation

✔ Attack path simulation

Mission → Become an elite enterprise red team specialist.


🏄 LIFE PHILOSOPHY

Surf

Surfer mentality applied to red teaming:

Flow Timing Precision Patience Control under pressure

Attack execution requires the same awareness as reading waves.


💼 PROFESSIONAL EXPERIENCE

Work

Security consulting environment exposure:

✔ penetration testing reports

✔ vulnerability analysis

✔ risk frameworks (ISO 27001 / NIST)

✔ enterprise security operations

✔ red team methodology observation

Career path → Red Team Specialist.


🔧 MAJOR TECHNICAL PROJECTS

Build

✔ Custom Kali NetHunter kernel (Samsung J8)

✔ HID / BadUSB attack payloads

✔ Offensive automation tools

✔ Command & Control experiments

✔ Red team simulation labs

✔ Security research environments

✔ Built MedusaPhisher a complex phishing framework


🛠 TECH STACK

💻 Systems

Linux Windows Parrot OS

⚙️ Languages

Python PowerShell Bash

📚 Learning

JavaScript SQL


🔬 SECURITY RESEARCH LABS

Lab

Simulating full attack lifecycle:

Initial access

Privilege escalation

Lateral movement

Persistence

C2 communication

Detection evasion

Physical compromise

All testing conducted ethically.


🧭 RED TEAM MASTER ROADMAP

Roadmap Status

2026 → Diploma + HTB Foundations + CRTP + CRTO
2027 → BSc + BSCP + OSCP + PAPA + HTB Certified Wireless Expert 2028 → MSc Enrollment + CRTE + CRTM
2029 → CRTL + Advanced Evasion + custom hardware tool development 2030 → Senior Red Team Specialist + OSEP (MSc Graduation)

Target: Enterprise Adversary Simulation Expert.


🛡️ Red Team Roadmap: The "Kidpentester" Path (2026-2030)

Year Phase Milestone / Goal Status
2026 Foundations OTHM Level 5 Diploma (UK Versity)
2026 Operator CRTP (Certified Red Team Professional) 🎯 APRIL 2026
2026 Operator CRTO (Certified Red Team Operator)
2027 Full-Stack BSc (Hons) Top-up Enrollment
2027 Web & AI BSCP (Burp Suite Certified) + PAPA (AI Pentesting)
2027 Full-Stack OSCP+ (OffSec Certified Professional)
2028 Specialist MSc Cybersecurity Enrollment
2028 Specialist CRTE (Red Team Expert) + CRTM (Red Team Master)
2029 Advanced HTB Certified Wireless Expert + BDO Red Team Transition
2029 Advanced CRTL (Red Team Lead / CRTO II)
2030 Elite MSc Graduation (Age 23) 🎓
2030 Elite OSEP (OffSec Experienced Pentester)


🎯 OPERATOR CAPABILITY TARGET

Goal

✔ Hybrid AD / Cloud compromise

✔ Stealth long-term campaigns

✔ Custom offensive frameworks

✔ Detection engineering awareness

✔ Purple team operations

✔ Technical leadership


📊 OPERATOR METRICS


🤝 COLLABORATION

Collab

Offensive tooling Red team labs Hardware hacking Adversary simulation frameworks


💬 ASK ME ABOUT

Pentesting Kali NetHunter Kernel building HID attacks Red team methodology Security automation


⚠️ ETHICAL DIRECTIVE

Ethics

Education Research Authorized testing Controlled environments

Unauthorized activity is not supported.


⭐ Follow the evolution of a future elite red team operator.

Popular repositories Loading

  1. MedusaPhisher MedusaPhisher Public

    Phishing tool script which generate phishing websites with a link to send to victim, the link genrated comes together with a QR code.Medusa Phisher helps pentesters to evaluate how well employees r…

    HTML 163 43

  2. OdinV4 OdinV4 Public

    OFFICIAL Samsung Odin v4 1.2.1 - For Linux

    161 13

  3. PhantomShell PhantomShell Public

    PowerShell reverse-shell payload generator engineered to bypass Windows Defender and AMSI.

    Python 19 2

  4. DuckHunter_HID_Scripts DuckHunter_HID_Scripts Public

    Ready made ducky scripts to use in nethunter Duckhunter HID attack to perform bad usb attack right at your fingertips.

    13 1

  5. ELIANA-Remote-Access-Trojan ELIANA-Remote-Access-Trojan Public

    An AI generated lightweight Python + Telegram C2 tool built for authorized VAPT engagements . It allows security testers with proper permission to remotely run approved commands, gather system inf…

    Python 10 1

  6. Digispark_DuckyScripts Digispark_DuckyScripts Public

    Transform your Digispark into a powerful keystroke injection tool! This repo provides scripts and guides for using your Digispark as a Rubber Ducky device, perfect for automation and security testi…

    C++ 6