- C/C++
- C#
- Python
- Assembler
- Reverse Engineering
- Cloud Development
- Web Development
🔭 I’m currently working on enhancing my Command and Control (C2) framework and developing advanced EDR bypass techniques.
🌱 I’m currently learning more about Windows internals, EDR bypassing, and cryptographic algorithms.
👯 I’m looking to collaborate on projects related to malware development and reverse engineering.
- Undetected LSASS Dumper & Mimikatz Runner: A project demonstrating bypassing Microsoft EDR to run Mimikatz in-memory.
- Command & Control Framework: Advanced C2 tool for various attack simulations.
- PE-Loader & EAT Hooking: Manually loading PE files and hooking Export Address Table (EAT) functions.
- Python Cryptography library: Implementations of RSA, ElGamal, and Diffie-Hellman algorithms in Python.
Socials