Hello, I'm

Vladimir Cuc

OSCP+ & Security+ Certified

Cybersecurity Enthusiast

I'm passionate about cybersecurity, especially offensive security. I focus on penetration testing, Active Directory attack paths, and automating red-team workflows to strengthen organizational defenses.

Latest Penetration Testing Insights

Explore my OSCP-style walkthroughs covering enumeration, exploitation, lateral movement, and privilege escalation with clear methodology.

Read Blog Posts

About Me

My path into cybersecurity started with a simple curiosity about how systems break — and how attackers think. Over time, that curiosity became a structured approach to understanding real adversarial behavior and reproducing it in controlled environments.

Most of my work revolves around designing realistic attack scenarios, mapping internal attack paths, and learning how modern organizations actually fail — not theoretically, but in practice. I enjoy deconstructing security assumptions, analyzing infrastructure from an attacker's perspective, and building efficient tooling to automate parts of the offensive workflow.

terminal
$sudo apt install caffeine
error: package already at latest version

Contact Information

(863) 338-7723
vladimircuc007@gmail.com
Lakeland, FL

Education

Bachelor of Science in Computer Science

Florida Southern College

2022 - 2025 • GPA: 3.8

Certifications

OSCP+ CertificationSecurity+ CertificationGoogle Cybersecurity CertificateMicrosoft Security, Compliance, and Identity FundamentalsMicrosoft Azure Fundamentals

Skills & Technologies

Core offensive security tools and techniques

Offensive Techniques

Active Directory Attack88%
Web App Testing85%
Pivoting/Tunneling82%
Privilege Escalation (Linux/Windows)90%
Lateral Movement86%

Tools

BloodHound87%
Burp Suite92%
Nmap/RustScan89%
Chisel/Ligolo-NG84%
Gobuster83%

Programming/Scripting

Python91%
PowerShell86%
Bash88%
Java79%
JavaScript82%

Professional Experience

Offensive security and engineering experience in one place

Help Desk Support Technician

Florida Southern College

October 2022 – Present
  • Tier-1 support for identity and access issues, resolving account lockouts and MFA problems for 100+ users.
  • Active Directory user management and secure authentication workflows.
  • Troubleshot Windows endpoints, RDP connectivity, and school applications.
  • Communicated technical steps clearly to support safe campus access.

Cybersecurity Intern

Publix Supermarkets Corporate

May 2025 – July 2025
  • Enhanced PowerShell domain-monitoring tool, increasing fraudulent domain detection by 50%.
  • Assisted red-team engineers with AD enumeration and privilege-escalation testing.
  • Triaged 200+ alerts in Microsoft Defender using Splunk queries to identify detection gaps.
  • Performed forensic E01 imaging and tuned SIEM thresholds for better detection accuracy.

Software Engineer Intern

Vertical Digital (Eleco Group)

May 2024 – Aug 2024
  • Designed secure RESTful APIs, improving data-flow efficiency by 40%.
  • Optimized MongoDB operations, reducing query response times by 35%.
  • Developed payment-processing engine, simulating 10,000+ transactions.
  • Worked in Linux environments, supporting offensive-security tooling automation.

Projects

Open-source security tools and automation scripts

RaptorRecon

RaptorRecon

Bash framework for fast OSCP-style recon across multiple targets.

View on GitHub
DragonMap

DragonMap

Bash script for credentialed Active Directory enumeration in assumed-breach scenarios.

View on GitHub

Featured Blog Posts

Penetration testing walkthroughs and OSCP-style write-ups

Let's Connect

Whether it's red-team work, lab write-ups, or building tooling for offensive security, I'm always open to interesting problems and collaborations.

(863) 338-7723
phish-terminal
vlad@lab:~/attachments

Phishing Check: Which one is safe to open?