<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Daniyal Ahmed | Red Team &amp; Cloud Security</title><link>https://daniyalahmed.dev/</link><description>Recent content on Daniyal Ahmed | Red Team &amp; Cloud Security</description><generator>Hugo -- gohugo.io</generator><language>en-us</language><managingEditor>daniyal.ahmed@microtechx.com (Daniyal Ahmed)</managingEditor><webMaster>daniyal.ahmed@microtechx.com (Daniyal Ahmed)</webMaster><lastBuildDate>Sun, 26 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://daniyalahmed.dev/index.xml" rel="self" type="application/rss+xml"/><item><title>About</title><link>https://daniyalahmed.dev/about/</link><pubDate>Sun, 26 Apr 2026 00:00:00 +0000</pubDate><author>daniyal.ahmed@microtechx.com (Daniyal Ahmed)</author><guid>https://daniyalahmed.dev/about/</guid><description>Hey, I&amp;rsquo;m Daniyal Ahmed I&amp;rsquo;m a Red Team &amp;amp; Cloud Security Engineer based in Pakistan. I break things professionally cloud environments, Active Directory, web apps and write about how I did it so others can defend better.
This blog is where I dump real-world attack techniques, cloud misconfiguration breakdowns, CTF writeups, and tooling I build along the way. What I Work On Cloud Pentesting — Azure / Entra ID attack paths, privilege escalation, lateral movement across tenants Red Team Operations — Initial access, credential abuse, defense evasion in modern enterprise environments Active Directory — Kerberoasting, ACL abuse, BloodHound analysis, domain takeover chains Bug Bounty — Web vulnerabilities, API security, logic flaws in real targets Tooling — Scripts, automation, and custom payloads built for offensive ops Certifications &amp;amp; Study SC-200 (Identity &amp;amp; Access) — in progress CRTOM - Red Team Leaders Writing Philosophy Every post here comes from something I actually ran against a lab, a CTF, or a real engagement.</description></item></channel></rss>