Cert IV Cybersecurity student, hardware hacker, and ethical hacking enthusiast based in South Australia. Building toward red team and penetration testing roles with a serious home lab and hands-on approach.
About Me
I'm a truck driver by day, cybersecurity student by night — actively transitioning into the security industry. Currently studying Certificate IV in Cybersecurity at TAFE SA, with a deep focus on offensive security and penetration testing.
What sets me apart from most beginners? I don't just study theory. I have a serious home lab — Proxmox clusters, SDR equipment, a Flipper Zero, WiFi Pineapple, and more — and I use it to actually break and understand things.
My background in RF and hardware hacking is a rare specialisation at my level. I'm working toward certifications including the eJPT, PNPT, and eventually OSCP while building my YouTube channel and public profile in the community.
Skills & Certifications
A mix of proven tools, platforms I work in daily, and certifications in progress.
Kali Linux, Ubuntu, Windows 11, DragonOS — daily driver in terminal environments.
TCP/IP fundamentals, network scanning, traffic analysis, wireless security concepts.
Hands-on RF interception, signal analysis, and hardware security research using specialised gear.
Building custom security tools on single-board computers and microcontrollers.
Practical usage across the core toolset used in ethical hacking and CTF environments.
Building practical scripts for automation, enumeration, and tooling workflows.
Home Lab & Projects
Real hardware, real networks, real skills. These aren't simulated labs — they're physical builds.
A portable, pocket-sized Kali Linux device built on a Compute Module 4 with the official Pi-Tail image. Designed for discreet network assessments and on-the-go testing.
Full RF security research setup using HackRF One (Mayhem firmware), RTL-SDR, and Evil Crow RF V2. Used for signal capture, replay analysis, and RF protocol research.
Custom-built Pwnagotchi on Raspberry Pi — an AI-driven WiFi handshake capture device. Passively harvests WPA handshakes for offline analysis and security research.
Multi-node Proxmox cluster across mini PCs used for running attack/defence labs, CTF environments, and experimenting with network segmentation and firewall rules.
RTX 4060 Ti-powered hashcat station for offline password cracking and WPA hash analysis. Used for CTF challenges and practical password security research.
Flipper Zero configured as a portable multi-tool for RFID analysis, IR cloning, sub-GHz signal research, and BadUSB payload delivery in authorised test environments.
Content Creation
Practical cybersecurity and hardware hacking content — no fluff, no slides. Real builds, real tools, real learning. If you're into RF hacking, home labs, and hands-on security, this is for you.
▶ Visit the ChannelBlog & Writeups
CTF writeups, tool breakdowns, and build logs. Written to learn, shared to help others.
How I set up the Waveshare CM4-NANO-A with the official Kali Pi-Tail image, the issues I hit, and how I solved them.
Read more →A beginner-friendly guide to the HackRF One, Mayhem firmware setup, and your first RF signal captures.
Read more →A honest breakdown of the SEC0 cert path, what knowledge gaps it exposed, and how to approach it smarter.
Read more →More writeups coming soon — follow along on YouTube for updates.
Contact
Open to entry-level cybersecurity roles, internships, freelance security work, and collaborations with other creators.