Skip to content
View vetementsvmnts's full-sized avatar

Block or report vetementsvmnts

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
vetementsvmnts/README.md
██╗  ██╗██╗████████╗███████╗ █████╗ ███╗   ██╗ █████╗
██║ ██╔╝██║╚══██╔══╝██╔════╝██╔══██╗████╗  ██║██╔══██╗
█████╔╝ ██║   ██║   ███████╗███████║██╔██╗ ██║███████║
██╔═██╗ ██║   ██║   ╚════██║██╔══██║██║╚██╗██║██╔══██║
██║  ██╗██║   ██║   ███████║██║  ██║██║ ╚████║██║  ██║
╚═╝  ╚═╝╚═╝   ╚═╝   ╚══════╝╚═╝  ╚═╝╚═╝  ╚═══╝╚═╝  ╚═╝

Kitsana Thuekoh

Systems Engineer · Penetration Tester · Offensive Security · Network Engineer

Typing SVG


whoami

I'm a Penetration Tester, Systems Engineer, and Cybersecurity Researcher who approaches every network, application, and system through the eyes of an attacker because understanding how things break is the only way to truly secure them.

With a foundation in IT Security Management, Endpoint Protection, and formal training in Ethical Hacking, I operate at the intersection of offensive research and secure engineering. Whether I'm mapping attack surfaces, hardening API layers, or building automation tooling for vulnerability analysis, the goal is always the same: eliminate blind spots before adversaries find them.

Currently studying at the Boston Institute of Analytics with a specialization in Cybersecurity & Ethical Hacking, and holding an Associate's Degree in Information Technology from the University of Acacia I pair academic rigor with hands-on lab practice across real-world attack scenarios.


🔴 Cybersecurity Focus

Domain Scope
Offensive Security Network reconnaissance, vulnerability research, credential interception in authorized lab environments
Network Engineering Traffic analysis, protocol exploitation, lateral movement simulation
Defensive Architecture Hardened endpoints, encrypted API surfaces, zero-trust principles
Research NTLMv2 hash analysis, Responder-based interception, automated CVE scanning
Secure Development Threat-modeled application design, secure B2C/SaaS architecture

🛠️ Technical Arsenal

Security & Infrastructure

Kali Linux Metasploit Nmap Wireshark Responder Burp Suite Docker Linux

Development Stack

TypeScript Python Node.js PostgreSQL Bash

Tools & Environment

Neovim tmux Git


🔬 Research & Lab Work

[LAB] NTLMv2 Hash Interception         → Responder + Hashcat pipeline in isolated AD environments
[LAB] Network Reconnaissance Workflow   → Nmap scripting engine (NSE) + custom enumeration scripts
[LAB] Vulnerability Scanning Automation → Python-driven CVE triage and report generation
[LAB] Credential Attack Surfaces        → SMB relay attacks, pass-the-hash techniques (authorized)
[LAB] Secure API Hardening              → Token rotation, rate-limiting, and anomaly detection layers

⚠️ All offensive research is conducted in authorized, isolated lab environments for educational and professional development purposes.


🎓 Education

┌──────────────────────────────────────────────────────────────────────────┐
│  INSTITUTION   Boston Institute of Analytics                             │
│  QUALIFICATION    Cybersecurity Specialization & Ethical Hacking         |
│  FOCUS AREAS   Penetration Testing · Threat Intelligence ·               │
│                Exploit Development · Ethical Hacking Methodology         │
└──────────────────────────────────────────────────────────────────────────┘

┌──────────────────────────────────────────────────────────────────────────┐
│  INSTITUTION   University of Acacia                                      │
│  QUALIFICATION Associate's Degree — Information Technology               │
│  PERIOD        Feb 2023 – Jul 2025                                       │
│  FOCUS AREAS   Network Infrastructure · Systems Administration ·         │
│                Software Engineering Fundamentals · IT Security           │
└──────────────────────────────────────────────────────────────────────────┘

📜 Licenses & Certifications

$ verify --credentials kitsana.thuekoh --issuer all
[✔] Resolving credential chain...
[✔] Cross-referencing issuing authorities...
[✔] All credentials verified.
Badge Certification Issuing Body Issued Core Competencies
🔵 Endpoint Security Cisco — Credly Verified Aug 2024 Endpoint threat detection & response, EDR/XDR fundamentals, malware triage, network access control policy enforcement, host-based intrusion prevention
🟢 Advanced Full Stack Development Industry Certified NOV 2025 Secure SDLC, API threat modeling, injection prevention, auth architecture, encrypted data transport
🔐 IT Security Management Industry Certified JUN 2025 Risk assessment frameworks (NIST/ISO), security governance, incident response lifecycle, audit & compliance alignment
🛡️ Endpoint Protection Specialist Industry Certified AUG 2024 DLP policy design, host hardening, vulnerability lifecycle management, HIDS configuration, attack surface reduction
🧠 Data Structures & Algorithms Industry Certified NOV 2025 Algorithmic complexity analysis, optimized data pipelines for security tooling, graph traversal for network mapping

📊 Threat Lab Stats

GitHub Stats Top Languages


⚙️ Current Operations

  • 🔍 Deepening expertise in Active Directory attack paths and mitigation strategies
  • 🧪 Building automated lab rebuild scripts for rapid, clean pentesting environments
  • 🛡️ Researching secure-by-default SaaS architecture patterns
  • ⌨️ Refining terminal workflows: Neovim + tmux + custom ZSH for offensive ops efficiency

📡 Contact


=

Popular repositories Loading

  1. Understanding-Networking-Reconnaissance Understanding-Networking-Reconnaissance Public

    Network Reconnaissance is the systematic discovery of a target's digital footprint. By mapping active hosts, open ports, and service versions, I identify the attack surface and potential entry poin…

  2. vetementsvmnts vetementsvmnts Public

  3. ARP-Spoofing-Man-in-the-Middle-Exploitation-in-Isolated-Network-Environments ARP-Spoofing-Man-in-the-Middle-Exploitation-in-Isolated-Network-Environments Public

    Hands-on research into ARP spoofing and MITM interception techniques conducted within isolated VirtualBox lab environments. Covers ARP cache poisoning, traffic redirection, and packet analysis usin…

    Python

  4. Building-a-Modular-SOC-Environment- Building-a-Modular-SOC-Environment- Public

    Focusing on centralized log aggregation, real-time alerting pipelines, threat intelligence integration, and automated incident response playbooks. Designed for detection engineering, forensic analy…

  5. VAPT-Security-Audit VAPT-Security-Audit Public

    Professional Vulnerability Assessment & Penetration Testing documentation, findings, and remediation tracking for security audit engagements.

  6. VM-Penetration-Test-And-Exploitation VM-Penetration-Test-And-Exploitation Public

    A senior-level offensive security repository covering penetration testing methodologies, exploit development, post-exploitation techniques, red team TTPs, and vulnerability research. Includes hands…