Security Researcher · CTF Player
Zirov
Self-taught security researcher focused on offensive security, network infrastructure, and low-level systems. I build labs, break things intentionally, and write about what I learn.
I got into security through curiosity — reverse engineering games, poking at network traffic, and eventually finding CTF competitions where all that tinkering turned into something structured. Since then I've gone deep into offensive security: Active Directory abuse, web application exploitation, network pivoting, and infrastructure automation.
Outside of competitions I run personal labs to simulate real environments — cloud-hosted with Terraform, hardened with Tailscale, and deliberately broken for practice. I document everything here so it's useful for others who learn the same way I do: by breaking things first and reading the docs second.
Present
Vulnerability research, CTF participation, and technical writing. Building and maintaining cloud-hosted offensive security labs. Contributing to security communities through writeups and tooling.
2024
Network administration, user support, and infrastructure maintenance. Introduced automated deployment workflows using Ansible. First exposure to enterprise Active Directory environments.
2023
Hardware and software support, documentation, and internal network monitoring. Started self-studying offensive security during this period.