About

I have a strong focus on advanced Penetration Testing and Red-Teaming methodologies. My expertise includes simulating sophisticated cyber threats using public or in-house developed tools and techniques. I combine in-depth technical knowledge with strategic planning to replicate and counter hacking tactics within ethical frameworks. With extensive hands-on experience, I can deliver actionable insights and robust solutions that can enhance cybersecurity postures across various environments.

Security researcher & Red-Team Operator with knowledge in malware development

Dedicated to continuous improvement for staying ahead of emerging cyber threats through ongoing education and research.

My current areas of focus include Covert Tools Development, Advanced Initial Access Solutions, Threat hunting, Reverse Engineering, TTPs Researching (Tactics, Techniques, and Procedures), C2 Agent Engineering.

C

C Programming

C++

C++ Programming

Assembly

Assembly Language

Rust

Rust Programming

Python

Python Programming

Go

Go Programming

PowerShell

PowerShell

Bash

Bash Scripting

Features

I'm interested in

Projects

Check my Projects

ShadowToken is designed for privilege escalation and detection evasion in a stealthy manner. The tool relies on token manipulation and fileless injections, utilizing Windows APIs, syscalls, persistence techniques, C2 communication, and UAC bypass methods. ShadowToken enables operation in secure environments by carefully selecting processes and adjusting privileges to avoid detection solutions.

ShadowToken

Privilege escalation& detection evasion

Temporal Shadow Manipulator (TSM) is a tool for establishing stealth persistence and bypassing security controls on Windows systems. Built with high precision, TSM leverages Assembly and C to interact directly with Windows internals, avoiding standard APIs and evading detection through unconventional shadow cache manipulation, temporary file obfuscation, and direct syscall invocation.

𝕿𝕾𝕸

Shadow Cache Injection

obfuscate payloads by converting them into hexadecimal format. It provides a simple method for payload masking, useful in security testing and Red Team engagements, where it’s essential to avoid detection through simple static analysis. This tool is designed for pre-processing payloads that will later be deobfuscated and executed by a loader.

Fast_Flux_Evader

Payload Obfuscation

Tradecraft for stealthy AMSI bypass and fileless PowerShell execution. Designed for penetration testers and security researchers, it leverages modern evasion techniques to bypass endpoint protections and execute encrypted payloads directly in memory.

Cloakk

Stealth AMSI Bypass and Encrypted PowerShell Executor

This project implements a Command and Control (C2) system designed for secure and efficient management of remote agents. It features advanced encryption, multi-protocol support, and a React-based dashboard for real-time monitoring and control.

Nigh_Vision

C2