Skip to main content

Command Palette

Search for a command to run...

Starting nickpaulsec

Published
1 min read
N
Security Engineer | Vulnerability Management | Red Teaming | Automation

I've spent 6 years in enterprise security — penetration testing, red team engagements, building internal security tooling at scale. Most of my work never gets documented publicly - and I'm changing that.

This blog is where I'm going to write about what I actually do — offensive techniques, cloud security research, security automation, and whatever else I'm digging into.

A few things I'm currently working on

AWS Security Specialty — expanding my cloud security depth beyond Azure and into AWS IAM, EC2 security, and cloud attack paths. Expect posts on that as I go deeper.

AI agent security — I've been researching exposed OpenClaw instances at internet scale. Built a scanner called clawscan that found 548 publicly accessible control panels across 2,980 scanned targets. Post on that coming soon.

AD CS attack chains — ESC1, ESC8, ESC11 across enterprise environments. The most underestimated attack surface in Active Directory. Breaking that down in an upcoming post.

If you're a practitioner who's tired of surface-level security content, you're in the right place. — Nick

8 views