I am Samuel Decarnelle, a cybersecurity student based in France with a particular focus on offensive security and penetration testing. My interest in security did not begin in a classroom. It began with the kind of curiosity that leads you to take systems apart, understand every layer, and ask what happens when something is configured incorrectly.
I run Arch Linux on my personal machine not because it is fashionable, but because it demands that you understand your system completely. I self-host my infrastructure on a 5-node Proxmox cluster hosting over 50 assets, built as a collaborative red team training environment with two colleagues.
I believe that the best way to defend a system is to understand precisely how it can be broken.
Enterprise-grade, high-availability, VLAN-segmented red team training environment.
┌─────────────────────────────────────────────────────────────┐
│ INTERNET │
└───────────────────────────┬─────────────────────────────────┘
│
┌───────────────────────────▼─────────────────────────────────┐
│ pfSense HA PAIR (WAN) │
│ VRRP VIP — Active / Passive Failover │
└──────┬──────────┬──────────┬──────────┬──────────┬──────────┘
│ │ │ │ │
VLAN 50 VLAN 60 VLAN 70 VLAN 80 VLAN 90
ADMIN DMZ PROD PRE-PROD SOC
│ │ │ │ │
┌────┴───┐ ┌────┴───┐ ┌────┴───┐ ┌────┴───┐ ┌────┴───┐
│Mgmt │ │LB x2 │ │Web x2 │ │Web x2 │ │Wazuh x2│
│Bastion │ │Bastion │ │AD x2 │ │AD x2 │ │Suricat.│
│Arch PC │ │RevProxy│ │DB x2 │ │DB x2 │ │Shuffle │
│ │ │VPN │ │DNS x2 │ │DNS x2 │ │Zabbix │
│ │ │Mail x2 │ │DHCP x2 │ │DHCP x2 │ │Bastion │
└────────┘ └────────┘ └────────┘ └────────┘ └────────┘
│
┌───────────────────────────▼─────────────────────────────────┐
│ PROXMOX CLUSTER — 5 NODES │
│ .249 / .250 / .251 / .252 / .253 │
│ Shared Network 192.168.40.0/24 │
└─────────────────────────────────────────────────────────────┘
Management access, Arch Linux workstation, bastion host, administrative control plane.
Load balancers, reverse proxies, VPN gateway, mail servers, public-facing bastion. Redundant pairs.
Web servers, Active Directory, databases, DNS, DHCP. Full HA with redundant pairs.
Apache testing, Windows Server 2025 with ADDS, DHCP testing environment.
Wazuh SIEM, Suricata IDS, Shuffle SOAR, Zabbix monitoring, OpenCTI threat intelligence.
Isolated offensive security subnet. Legal red team target environment for penetration testing practice.