I'm a cybersecurity professional specializing in offensive security, with a focus on stealthy post-exploitation, red teaming techniques, and advanced malware evasion on Windows environments.
- Advanced Windows internals & exploitation
- Custom offensive tooling in C# and PowerShell
- Endpoint security evasion:
- Indirect syscalls & syscall stubbing
- Process Hollowing, injection, and parent spoofing
- AMSI & ETW bypasses
- Active Directory enumeration & abuse
- Web and infrastructure penetration testing
- Building stealthy C# loaders for AES-encrypted shellcode
- Implementing indirect syscalls to evade EDRs
- PowerShell payload delivery with runtime obfuscation
- Simulating APT-like techniques in lab environments
- π― OSEP β Offensive Security Experienced Penetration Tester (in progress)
- π‘οΈ CPTS β Certified Penetration Testing Specialist (Hack The Box)
- π§ Zephyr Pro Lab β Completed (Active Directory exploitation lab by HTB)
- Languages:
C#
,PowerShell
,Python
,Bash
- Environments: Windows (internal systems, AD), Linux (offensive infra)
I focus on realistic attack simulation, stealthy persistence, and low-level Windows internals. My goal is to bridge offensive creativity with technical precision to help organizations strengthen their defenses through better adversary emulation.