About
Hey, I’m Daniyal Ahmed
I’m a Red Team & Cloud Security Engineer based in Pakistan. I break things professionally cloud environments, Active Directory, web apps and write about how I did it so others can defend better.
This blog is where I dump real-world attack techniques, cloud misconfiguration breakdowns, CTF writeups, and tooling I build along the way.
What I Work On
- Cloud Pentesting — Azure / Entra ID attack paths, privilege escalation, lateral movement across tenants
- Red Team Operations — Initial access, credential abuse, defense evasion in modern enterprise environments
- Active Directory — Kerberoasting, ACL abuse, BloodHound analysis, domain takeover chains
- Bug Bounty — Web vulnerabilities, API security, logic flaws in real targets
- Tooling — Scripts, automation, and custom payloads built for offensive ops
Certifications & Study
- SC-200 (Identity & Access) — in progress
- CRTOM - Red Team Leaders
Writing Philosophy
Every post here comes from something I actually ran against a lab, a CTF, or a real engagement. I explain the why behind each technique, not just the commands. If you can’t explain it, you don’t own it.
Contact
- Email: daniyal.ahmed@microtechx.com
- LinkedIn: linkedin.com/in/daniyal-ahmed-khan-g
- GitHub: github.com/DaniyalAhmed-kh
“Offense informs defense. Know how it breaks to know how to build.”