About Skills Projects Why Me Contact Hire Me
AVAILABLE FOR OPPORTUNITIES

Penetration
Tester.

I'm Anshuman Jha — OSCP+ certified security professional who finds vulnerabilities before attackers do. Active Directory exploitation, web app pentesting, and red team operations.

🏅 OSCP+ 🎯 eJPT ⚔ HTB Hacker ● 4 Pro Labs
0
Pro Labs Done
0
Certifications
24H
OSCP Live Exam
2025
OSCP+ Year
OSCP+
🛡️
Anshuman Jha
Penetration Tester
CertificationOSCP+ · Aug 2025
Second CerteJPT · INE Security
HTB RankHacker ⚔
SpecializationActive Directory
HTB Pro Labs Completed
Dante
Cybernetics
Zephyr
RastaLabs
StatusOpen to Work
Active
About Me

Who I am & what
I bring to the table

I'm Anshuman Jha, a Penetration Tester with a deep passion for offensive security. I hold the OSCP+ certification from Offensive Security — one of the industry's most respected hands-on security credentials — earned August 2, 2025.

My expertise spans Active Directory exploitation, web application pentesting, and red team operations. I've completed all 4 HackTheBox Pro Labs including the advanced Cybernetics and RastaLabs environments that simulate hardened enterprise networks with live defensive tooling.

Beyond breaking things, I build them — my open-source OSCP+ / OSEP Advanced Cheatsheet v3 is an interactive reference tool with variable substitution used by the community during live engagements.

🏅
OSCP+ CertifiedPassed OffSec's grueling 24-hour live hacking exam — Aug 2, 2025
🏆
4 Pro Labs CompletedDante · Cybernetics · Zephyr · RastaLabs — all done
🛠️
Open Source BuilderPublished OSCP+ cheatsheet tool used by the pentest community
🎯
Available NowOpen to pentesting engagements, audits & full-time roles
HTB Pro Labs
Dante
Cybernetics
Zephyr
RastaLabs
anshuman@kali — bash
┌──(anshuman㉿kali)-[~] └─$ cat profile.json { "name" : "Anshuman Jha", "role" : "Penetration Tester", "cert" : "OSCP+ (Aug 2, 2025)", "status" : "Available for hire" } └─$ ./run_prolabs.sh [PWNED] Dante ████████ 100% [PWNED] Cybernetics ████████ 100% [PWNED] Zephyr ████████ 100% [PWNED] RastaLabs ████████ 100% └─$ echo "Ready to work" Ready to work 🚀 └─$
Capabilities

Core Skills

Proven across OSCP+ exam, 4 Pro Labs, and real-world engagements.

🏰
Active Directory
BloodHoundKerberoastingDCSyncPass-the-Hash
🐧
Privilege Escalation
Linux PrivEscWindows PrivEscSUID/SUDOGTFOBins
🌐
Web App Pentesting
Burp SuiteSQLiXSSSSRFOWASP Top 10
🔗
Network Security
NmapMetasploitPivotingWireshark
💻
Scripting & Automation
PythonBashImpacketSQLmap
🔴
Red Team Operations
C2 FrameworksEDR EvasionLateral Movement
Work

Projects & Achievements

🏅 FLAGSHIP ACHIEVEMENT
OffSec OSCP+
Certification
PASSED · AUGUST 2, 2025
Verify Certificate
About This Achievement

Passed the Offensive Security Certified Professional Plus (OSCP+) — the gold standard in hands-on penetration testing certifications. A 24-hour live exam requiring compromise of multiple machines including a full Active Directory environment. Proves real-world ability to enumerate, exploit, escalate, pivot, and report under pressure — not theory.

24-Hour Live Exam Active Directory Buffer Overflow Pivoting & Tunneling
📝
LIVE
OSCP+ Advanced Cheatsheet v3

Interactive pentesting reference with LHOST/RHOST variable auto-fill across 200+ commands, favorites & export. Used during live engagements.

Open SourceInteractiveOSCP+
Live Demo    Source
🏰
COMPLETED
Cybernetics Pro Lab

HTB's hardest AD lab — multi-forest, domain trust abuse, live AV/EDR. Chained complex attacks across forest boundaries for full compromise.

Multi-Forest ADTrust Abuse
HTB Profile
🔴
COMPLETED
RastaLabs Pro Lab

Red team lab with live EDR — deployed C2 frameworks, bypassed endpoint defenses, achieved persistent access in hardened Windows enterprise.

EDR EvasionC2 Framework
HTB Profile
🔗
COMPLETED
Zephyr Pro Lab

Corporate network simulation — intermediate AD attacks, web exploitation chains, and Windows privilege escalation across segmented environment.

KerberoastingWeb Exploit
HTB Profile
🌐
COMPLETED
Dante Pro Lab

Full network pentest — initial foothold, pivoting through subnets, AD exploitation, full domain compromise. Complete offensive security kill chain.

Active DirectoryPivoting
HTB Profile
🐙
ACTIVE
GitHub Portfolio

Open-source security tools — MyCheatsheet and PentestCheatsheet repositories. Practical tools built from real engagement experience.

Open Source2 Repos
View GitHub
Why Hire Me

What sets me apart

01
🏅
Industry-Certified

OSCP+ is not multiple choice — it's a 24-hour live hacking exam. Passing it proves actual capability under real conditions.

02
🧪
Advanced Lab Experience

4 HTB Pro Labs completed including Cybernetics & RastaLabs — the hardest enterprise simulation environments with live defenses.

03
🛠️
Builder & Contributor

Built an open-source OSCP+/OSEP cheatsheet with 200+ commands — actively used by the security community.

04
📋
Structured Methodology

Follows documented methodology — enumeration → exploitation → post-exploitation → reporting aligned with PTES and OWASP standards.

05
🔒
Ethical & Responsible

Strong commitment to responsible disclosure, confidentiality, and ethical hacking. Understands legal and professional scope.

06
📈
Always Upskilling

Actively training through HackTheBox and OffSec. Current with latest attack techniques — not relying on outdated knowledge.

Contact

Let's work together

Open to opportunities

Available for penetration testing engagements, security audits, red team operations, and full-time / freelance roles.

Send a message