GUSTAVO FLORES, JR.
Cyber Security
Location: Denver, Colorado
Email: **************@*****.***
Mobile number: 951-***-****
LinkedIn: https://www.linkedin.com/in/gustavoflores9001 Github: https://github.com/Shellshock9001
SUMMARY
Independent cybersecurity expert specializing in wireless network exploitation, including deauthentication and Evil Twin attacks, using custom tools like Shellshock’s Wi-Fi Sentinel and Shellshock’s Network Nuke. Skilled in red team tactics, such as phishing and QR code attacks, to identify and remediate security vulnerabilities. Experienced in developing tools for penetration testing and threat detection. Completed over 80 TryHackMe challenge rooms, ranking in the top 2% among millions of users. CERTIFICATIONS
• CompTIA Security+
• CompTIA Network+
• CompTIA A+
NOTABLE PROJECTS
• Season IV US Cyber Games Kick-Off Celebration: Placed in the top 10% of participants and successfully completed 9 challenges.
• Department of Defense Cyber Sentinel 2024 CTF Challenge: Participated in Capture the Flag (CTF) challenges.
• Shellshock’s Network Nuke - Engineered a robust tool capable of executing deauthentication attacks on ALL nearby wireless devices. Shellshocks_Network_Nuke_LinkedIn_Post
• Shellshock's Wi-Fi Sentinel - Innovated an AI-generated tool to detect outdated security standards and Evil Twin Wi-Fi networks. Shellshocks_Wi-Fi_Sentinel_LinkedIn_Post
• Shellshock’s Delivery Service: Designed a versatile tool for efficient file transfer across different systems using multiple methods.
• Phishing Campaigns: Engineered and executed campaigns with deceptive sites and credential logging servers to enhance security awareness training. Phishing_Campaign_LinkedIn_Post
• Reporting: Analyzed and reported on cybersecurity threats for the FBI Most Wanted. TECHNICAL EXPERTISE
• Wireless Network Exploitation: Expertise in wireless network attack vectors, including deauthentication attacks, Evil Twin attacks, and rogue access points. Demonstrated from Shellshock’s_Network_Nuke.
• Red Team Techniques: Understanding of advanced offensive security strategies to simulate real-world attacks and improve organizational defenses. Demonstrated from engineering Phishing Campaigns, QR_Code Attacks.
• Tool Development: Proficiency in building custom penetration testing tools that automate complex attack sequences, handle various network conditions, and provide actionable results. Education
Bachelor of Science in Cyber Security and Information Assurance Western Governors University, June 2025