About
👋 Hi, I’m Ben (Gr3yhood)
I’m an aspiring penetration tester based in Toronto, Canada, focused on physical pentesting, red teaming, and application security.
Im trying to break things for a living (ethically). If it beeps, blinks, or trusts user input, I’m probably trying to mess with it responsibly.
I’m currently grinding through the Hack The Box CPTS path, building real-world skills in attacking and defending modern systems. I like understanding how stuff breaks, why it breaks, and how to fix it before someone way more malicious shows up.
🛠️ Favorite Tool
One of my favorite offensive security tools is Cobalt Strike. Especially for learning post-exploitation, adversary simulation, and making blue teams mildly uncomfortable (in a productive way).
🎯 Goals (The Grindset)
- Finish the CPTS, OSCP, CRTO, and CWEE certifications
- Go on my first professional physical pentest (touching doors, not grass)
- Give back to the community with write-ups, guides, and tutorials so others don’t have to suffer the same way I did
🧪 Some Hardware (aka my little friends)
Things I own that make airport security nervous:
- Flipper Zero with Awok Dual Touch ESP32
- WiFi Pineapple & Pineapple Pager
- USB Rubber Ducky
- Bash Bunny
- LAN Turtle
- Shark Jack
- Key Croc
- Packet Squirrel
- HackRF
Yes, they all have names. No, you can’t see the list.
🌐 Connect With Me
If you see my username pop up somewhere suspicious… no you didn’t.
- YouTube: https://youtube.com/@gr3ysec
- Instagram: https://instagram.com/gr3ysec
- TikTok: https://tiktok.com/@gr3ysec
⚠️ All content on this site is for educational purposes only.
If you use anything here irresponsibly, that’s on you. I’m just documenting the learning arc.