Offensive Security Operator @ Armadin

Derek Haber

~/ _

Breaking things
before others do.

I'm an offensive security professional specializing in web application security and adversarial consulting. At Armadin, I conduct targeted offensive engagements — identifying vulnerabilities before adversaries do and translating findings into actionable intelligence.

With a background in application security engineering, I bridge the gap between builder and breaker, bringing a developer's intuition to offensive work. I also integrate AI tooling into security assessments, augmenting coverage and accelerating vulnerability discovery at scale.

Focus Area
Web Application Security
Engagement Type
Offensive Consulting
Employer
Armadin
Specialization
AI-Augmented Assessments

What I Do

Offensive Security Consulting

Adversarial assessments that go beyond automated scanning. I simulate real-world threat actors, giving organizations an unfiltered view of their attack surface and true risk exposure.

Red Teaming Threat Modeling Attack Simulation Risk Assessment

AI-Augmented Assessments

Leveraging large language models and AI tooling to enhance offensive security workflows — from intelligent reconnaissance to automated vulnerability analysis and coverage at scale.

LLM-Assisted Recon Intelligent Fuzzing Automated Analysis AI Security

Public Projects

01

Argus Proxy

Lightweight Java-based HTTP intercepting proxy and web application security scanner. Features real-time traffic interception, active/passive scanning (XSS, SQLi, path traversal, header misconfigs), a fuzzer, request repeater, and spider.

Java Proxy Web Security Scanner
02

Candid

Mobile app for sharing vintage-filtered photos exclusively with your close friend group. No public feeds, no algorithmic discovery — only your circle can see your posts.

TypeScript Mobile Social

Research & Writing

// CVEs

CVE-2025-52888 Jun 2025

XXE Injection in Allure 2 XML Parsing Plugins — Allure Framework

XML External Entity injection in Allure 2's xunit, JUnit, and TRX result-processing plugins. Unsafe DocumentBuilderFactory configuration allows arbitrary file read and SSRF via crafted test result XML in CI/CD pipelines. CVSS 7.5 (High). Fixed in v2.34.1.

View Advisory →