About

About

👋 Hi, I’m Ben (Gr3yhood)

I’m an aspiring penetration tester based in Toronto, Canada, focused on physical pentesting, red teaming, and application security.

Im trying to break things for a living (ethically). If it beeps, blinks, or trusts user input, I’m probably trying to mess with it responsibly.

I’m currently grinding through the Hack The Box CPTS path, building real-world skills in attacking and defending modern systems. I like understanding how stuff breaks, why it breaks, and how to fix it before someone way more malicious shows up.


🛠️ Favorite Tool

One of my favorite offensive security tools is Cobalt Strike. Especially for learning post-exploitation, adversary simulation, and making blue teams mildly uncomfortable (in a productive way).


🎯 Goals (The Grindset)

  • Finish the CPTS, OSCP, CRTO, and CWEE certifications
  • Go on my first professional physical pentest (touching doors, not grass)
  • Give back to the community with write-ups, guides, and tutorials so others don’t have to suffer the same way I did

🧪 Some Hardware (aka my little friends)

Things I own that make airport security nervous:

  • Flipper Zero with Awok Dual Touch ESP32
  • WiFi Pineapple & Pineapple Pager
  • USB Rubber Ducky
  • Bash Bunny
  • LAN Turtle
  • Shark Jack
  • Key Croc
  • Packet Squirrel
  • HackRF

Yes, they all have names. No, you can’t see the list.


🌐 Connect With Me

If you see my username pop up somewhere suspicious… no you didn’t.

  • YouTube: https://youtube.com/@gr3ysec
  • Instagram: https://instagram.com/gr3ysec
  • TikTok: https://tiktok.com/@gr3ysec

⚠️ All content on this site is for educational purposes only.
If you use anything here irresponsibly, that’s on you. I’m just documenting the learning arc.