$ cat profile.json

Aaron
Haymore

// Zonifer

1 m4k3 c0mput3rs m1sb3h4v3.

→ Read My Write-ups Get In Touch
Penetration Testing Red Team Operations Adversary Simulation Offensive Security Exploit Development Social Engineering C2 Infrastructure Active Directory Attacks Penetration Testing Red Team Operations Adversary Simulation Offensive Security Exploit Development Social Engineering C2 Infrastructure Active Directory Attacks
01 — About
$ whoami —verbose

Penetration tester, red team operator, and purple team practitioner with a passion for teaching and training. I specialize in offensive security, Active Directory attacks, cloud environments, web application testing, and network infrastructure — uncovering the attack paths that automated scanners miss so defenders know exactly what to fix.

zonifer@kali ~ zsh
zonifer@kali ~ $ cat profile.json
{
  "handle": "Zonifer",
  "name": "Aaron Haymore",
  "roles": ["Red Team Operator", "Penetration Tester", "CTF Competitor"],
  "specializations": ["Active Directory", "Cloud", "Web Apps", "Network Infrastructure"],
  "certs": ["OSCP", "OSWA", "CRTO"],
  "location": "Salt Lake City, UT",
  "available": true
}
# SaintCon Black Badge Holder
zonifer@kali ~ $
02 — Skills
$ ls -la capabilities/
[01]
Network Penetration Testing
External & internal assessments, pivoting, lateral movement, domain compromise.
NmapMetasploitBloodHoundImpacket
[02]
Active Directory Attacks
Kerberoasting, AS-REP, Pass-the-Hash, DCSync, trust abuse, and full domain takeover.
RubeusMimikatzCrackMapExecPowerView
[03]
Web Application Testing
OWASP Top 10, auth bypasses, business logic flaws, API attacks, and chained exploits.
Burp SuiteSQLMapffufnuclei
[04]
Red Team Operations
Full-scope adversary simulation, phishing, C2 infrastructure, evasion, and persistence.
Cobalt StrikeHavocSliverGoPhish
[05]
Teaching & Training
Security education, mentorship, and hands-on training for offensive and defensive practitioners.
MentorshipCTFWorkshopsCourse Dev
[06]
Social Engineering
Phishing campaigns, vishing, pretexting, and physical intrusion planning and execution.
OSINTEvilginxGoPhishMaltego
03 — Write-ups & Research
$ cat /var/log/research.log
$ fetching latest posts...
View all write-ups →
04 — Contact
$ nc -lvnp 443  # waiting for connection

Let's talk shop.

Open to discussing red team engagements, security research, CTF collaboration, and conference talks. If you've got an interesting target or a hard problem, I want to hear about it.

Response time varies — I'm probably in a shell somewhere.