Skip to main content

About the Author

Andrey Pautov — CTI researcher with a strong background in offensive security, penetration testing, and AI-driven attack simulation.

I focus on cyber threat intelligence, adversary profiling, real-world attack simulations, and detection engineering — with deep hands-on roots in red teaming, Active Directory exploitation, and cloud security. Building tools and publishing research that bridges the gap between threat intelligence and offensive practice.

HexStrike AI is one of those tools: a real, working MCP orchestrator that bridges large language models to the full penetration testing toolkit — built from experience in the field, not from specs.


What I Write About

  • AI-driven penetration testing and autonomous attack orchestration
  • Active Directory attacks — from enumeration to domain compromise
  • Red team tradecraft: web exploitation, network pivoting, credential abuse
  • Cloud security — AWS, GCP, Azure attack and defense
  • Cyber Threat Intelligence and threat actor profiling
  • Detection engineering and blue team countermeasures

All techniques are demonstrated in authorized lab environments. Every guide on this site maps to a real engagement scenario.


Support This Work

If this research saved you time, helped you pass a certification, or gave you ideas for your own lab — consider buying me a coffee.

Running lab infrastructure, maintaining tools, and publishing detailed research takes real time and money.

Support this project — Keep the lab running

Your support directly funds:

  • New vulnerable lab builds (AD, cloud, IoT)
  • HexStrike AI development and new tool integrations
  • More in-depth walkthroughs and research articles

Stay Connected

Follow for practical cybersecurity research. New guides, tool releases, and research drops regularly.

PlatformLink
Mediummedium.com/@1200km
LinkedInlinkedin.com/in/andrey-pautov
GitHubgithub.com/anpa1200
Email1200km@gmail.com

CTI researcher with a strong background in offensive security — if that's your world too, this is the right place.