Skip to content
View daniel-ploetzl's full-sized avatar

Highlights

  • Pro

Block or report daniel-ploetzl

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
daniel-ploetzl/README.md

Daniel Plötzl

Offensive Cybersecurity Practitioner completing the Computer Science Engineering program at 42 Vienna (project-based, peer-to-peer learning model), with a strong focus on Linux internals, system behaviour analysis and penetration testing fundamentals.

Hands-on experience building low-level Linux tooling, system interaction analysis frameworks and endpoint input simulation projects in controlled environments.


🛠️ Tech Stack

Security & Systems

Linux Bash Git

Languages

C C++

Tools & Environment

Neovim Tmux Docker VirtualBox Wireshark Nmap


Technical Focus

  • Linux internals: process lifecycle, signals, session management, file systems
  • System behaviour analysis: execution context and runtime observation
  • Penetration testing fundamentals: system interaction and attack surface understanding
  • Networking fundamentals: TCP/IP, ports, client-server communication
  • Scripting and automation: Bash tooling for system analysis and control
  • Endpoint interaction: USB HID input simulation and device-level behaviour

Current Direction

  • Offensive security tooling and system analysis
  • Linux internals and process behaviour research
  • Endpoint simulation and interaction testing
  • Practical penetration testing skill development

📁 Selected Projects

  • ⚙️ proc-lab — Linux process lifecycle and execution behaviour analysis
  • 🖥️ x11-lab — X11 session behaviour and input handling analysis
  • ⌨️ hid-lab — USB HID input simulation using embedded hardware

Pinned Loading

  1. hid-lab hid-lab Public

    USB Human Interface Device (HID) simulation project for studying user input behaviour and endpoint activity detection

    C

  2. proc-lab proc-lab Public

    Bash-based lab tool for analysing Linux process lifecycle, session behaviour and runtime execution patterns

    Shell

  3. x11-lab x11-lab Public

    Minimal Xlib program that takes full control of an X11 session from user space using standard POSIX and X11 primitives.

    C