Skip to content
View reatva's full-sized avatar

Block or report reatva

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
reatva/README.md

Hi , I'm Adrian Reategui

Who am I?

⚡ OSCP/OSCP+ Certified Professional
🔭 CWES/CBBH
✏️ Self taugh Cybersecurity student: Red and Blue team
💻 CTF player (HacktTheBox & ProvingGrounds)
📚 Constantly learning to keep developing my skills
🤔 I’m currently open for: An Intern or a new job opportunity, this is MY RESUME.

Certificates

Contact me

Technologies

Projects

AWS Cloud Attack Chain - Codefinger Attack

Part of an ongoing series of open-source AWS attack labs built around real-world incidents and techniques. This lab is modeled on the Codefinger S3 SSE-C ransomware attack observed in January 2025. The goal is not to simulate a CTF challenge but to replicate the decision-making process of a real engagement

Vulnerable Active Directory Lab

Custom vulnerable ACtive Directory Environment

A professionally structured Active Directory (AD) lab environment designed for hands-on learning and security testing. This lab simulates common real-world misconfigurations and vulnerabilities found in enterprise Windows domains, making it ideal for red team training, blue team defense, and purple team analysis.


Weaponized Installer Lab

Weaponized Installer Lab

This Project simulates a read team scenario where a legitimate installer is modified to carry a stealth payload. The goal is to demonstrate payload delivery via social engineering, without raising antivirus alarms. This lab is ideal for red team training, blue team defense, and purple team analysis.


Vulnerability-Management-Lab

Vulnerability Management Lab

Vulnerability Management Lab is a hands-on project that simulates a real-world vulnerability management workflow within a Windows domain environment. Utilizing open-source tools and manual patching techniques, this lab demonstrates the process of identifying, prioritizing, remediating, and validating vulnerabilities.


Threat Hunting & Incident Response Lab

Weaponized Installer Lab

A structured Threat Hunting and Incident Response (IR) lab designed for hands‑on learning with Microsoft Sentinel and Defender for Endpoint. This lab simulates realistic detection, investigation, and response workflows against common attacker TTPs.


Popular repositories Loading

  1. reatva reatva Public

  2. CS-Cart-1.3.3-RCE CS-Cart-1.3.3-RCE Public

    CS-Cart 1.3.3 RCE exploit for CTF

    Python

  3. Vulnerable-Active-Directory-Lab Vulnerable-Active-Directory-Lab Public

    Automated Vulnerable Active Directory Lab inspired by OSCP-style enumeration and exploitation.

    PowerShell 1

  4. Vulnerability-Management-Lab Vulnerability-Management-Lab Public

    Hands‑on VM lab: Nessus scans & manual patching

  5. Weaponized-Installer-Lab Weaponized-Installer-Lab Public

    Demo lab: Build & deploy a weaponized Windows installer

    HTML

  6. Threat-Hunting-Incident-Response-Lab Threat-Hunting-Incident-Response-Lab Public

    This lab is inspired by concepts and guidance from Josh Madakor’s Cyber Range course.