The Bladesmith
I'm Edoardo Novello, Red Team Operator specialized in Infrastructure and Active Directory

I'm Edoardo Novello, Red Team Operator specialized in Infrastructure and Active Directory

Electroxero

Ten years old, a mansard, and a laptop across the room. One question: how hard could it be to get in. That was the beginning.That was the first cut. That question made me a hacker.

After almost eight years in red teaming, I've built a broad set of blades. Those blades were tested under real pressure: financial institutions, critical infrastructure, TIBER and DORA regulated engagements, and operations where I carried both the edge and the responsibility of leading the team. I never shared much of it publicly. Only with the people who earned it, and friends who care about the same craft. That was always intentional. Sharp tools don't get handed around carelessly.

Knifesec is an independent project, born some years ago, left to rust for three, now back in the forge. Not to teach. Not to sell. To sharpen.

THE KNIFE SET

Red Teaming

This is my current, and most sharp knife selection. The knife set is composed of an early external recon experience from bug bounty, and some custom-designed knives for any kind of phishing filets, post exploitation and evasion, and where my favorite and most sharp knife lives: Active Directory (Bunka).

Infrastructure Development

This is my scalpel, always ready to design in every kind of material, which is also part of my last years of research, where I tried to combine most of the skills I obtained in web into modern red team tooling, to design new ideas.

Web App Sec

This is my old knife, once was a razor, now it drives me toward new domains. I entered the hacking world doing mostly web app sec, and I got extremely passionate about SQLi and complex back-end vulnerabilities like HTTP smuggling and web cache poisoning. During the transition to pure red team operator, I used my bug bounty experience to build a discovery strategy I later brought into red teaming.