Hi, I'm Daniel Serbu

Penetration Tester & Security Researcher

Offensive security specialist with expertise in web application testing, cloud security, mobile security, and DevSecOps. Breaking things to make them stronger.

daniel@redteam:~
*Evil-WinRM* PS C:\Users\daniel> whoami /all
[+] User: daniel_serbu
[+] Role: Penetration Tester & Security Researcher
[+] Privileges: SeDebugPrivilege (ENABLED)
*Evil-WinRM* PS C:\Users\daniel> type expertise.txt
Web Application Security | Cloud Pentesting (AWS/Azure/GCP)
Mobile Security (Android/iOS) | Active Directory | DevSecOps | OSINT
*Evil-WinRM* PS C:\Users\daniel> Get-ChildItem certifications\ | Format-Table
eCPPT - Certified Professional Penetration Tester
eMAPT - Mobile Application Penetration Tester
eJPTv1 - Junior Penetration Tester v1
CAPenX - Certified AppSec Pentesting eXpert
CCPenX-AWS - Certified Cloud Pentesting eXpert - AWS
CRTSv2 - Certified Red Team Specialist v2
CELMS - Certified Enterprise Lateral Movement Specialist
CRTA - Certified Red Team Analyst
AD-RTS - Active Directory Red Team Specialist
API-RTA - API Red Team Analyst
MCRTA - Multi-Cloud Red Team Analyst
C-AI/MLPen - Certified AI/ML Pentester
CAPen - Certified AppSec Pentester
C-APIPen - Certified API Pentester
CNPen - Certified Network Pentester
CMPen-Android - Certified Mobile Pentester - Android
CAPT - Certified Android Penetration Tester
CIPT - Certified iOS Penetration Tester
*Evil-WinRM* PS C:\Users\daniel> .\pivot_network.ps1
[+] Network pivot established. Target acquired.
[+] Engagement ready. Let's hunt for vulnerabilities...

About

I'm a security professional specializing in offensive security and penetration testing. My work focuses on identifying vulnerabilities in web applications, APIs, cloud infrastructure, and mobile applications before malicious actors can exploit them.

With a strong foundation in multiple offensive security methodologies and DevSecOps practices, I approach each engagement with a thorough, methodical mindset. I'm passionate about continuous learning, sharing knowledge through detailed writeups, and staying ahead of emerging threats.

I maintain comprehensive resources covering DevSecOps, OSINT, and penetration testing methodologies. Currently focused on web application security, bug bounty hunting, and cloud security across AWS, Azure, and GCP.

Skills

Web Application Security

OWASP Top 10SQL InjectionXSSCSRFSSRFXXEAuth BypassBusiness Logic

Tools & Frameworks

Burp Suite ProCobalt StrikeMetasploitNmapSQLMapNucleiFfufHashcatImpacket

Cloud Security

AWS PentestingAzure SecurityGCP AssessmentIAM AnalysisS3 MisconfigsCloud Forensics

Mobile & API Testing

Android PentestingiOS AssessmentREST APIGraphQLMobile OWASPFrida

DevSecOps

Container SecurityKubernetesSASTDASTSCASBOMIaC SecuritySecure Coding

Active Directory & Network

AD ExploitationKerberoastingPass-the-HashPivotingWi-Fi SecurityEvil-WinRM

Certifications

eCPPT - Certified Professional Penetration Tester

INE Security (eLearnSecurity)

eMAPT - Mobile Application Penetration Tester

INE Security (eLearnSecurity)

eJPT - Junior Penetration Tester

INE Security (eLearnSecurity)

CAPenX - Certified AppSec Pentesting eXpert

The SecOps Group

CCPenX-AWS - Certified Cloud Pentesting eXpert - AWS

The SecOps Group

CRTSv2 - Certified Red Team Specialist v2

CyberWarfare Labs

CELMS - Enterprise Lateral Movement Specialist

CyberWarfare Labs

CRTA - Certified Red Team Analyst

CyberWarfare Labs

AD-RTS - Certified AD Red Team Specialist

CyberWarfare Labs

API-RTA - Certified API Red Team Analyst

CyberWarfare Labs

MCRTA - Multi-Cloud Red Team Analyst

CyberWarfare Labs

C-AI/MLPen - Certified AI/ML Pentester

The SecOps Group

CAPen - Certified AppSec Pentester

The SecOps Group

C-APIPen - Certified API Pentester

The SecOps Group

CNPen - Certified Network Pentester

The SecOps Group

CMPen-Android - Certified Mobile Pentester - Android

The SecOps Group

CAPT - Certified Android Penetration Tester

Mobile Hacking Lab

CIPT - Certified iOS Penetration Tester

Mobile Hacking Lab

Experience

Contact

Interested in working together? Let's connect.