SystemWOW

Loading core modules...

SystemWOW

[SYSTEM:ONLINE]

Exploit Developer ยท Offensive Security Researcher

Exploit Development ยท Red Team Tooling ยท Vulnerability Research

Vanguard of Advanced Security and Cyber Offense

โŒ„โŒ„

About.

I'm an offensive security researcher focused on exploit development, malware research, and building custom tooling for red team operations.

My work spans low-level Windows internals โ€” process injection, EDR evasion, shellcode development, and binary analysis โ€” through to web application testing and automated recon pipelines. I write primarily in C++, Rust, Python, and Go, and build tools I actually use in engagements.

I'm self-taught, which means everything I know came from breaking things, reading source code, and building from scratch โ€” not a classroom.

Current Focus:

  • - Exploit development and 0-day vulnerability research
  • - Malware development โ€” evasion, polymorphic techniques, process injection
  • - Custom C2 tooling and implant development in Rust
  • - Recon automation and attack surface mapping

Projects.

Active Projects

WinSysManipulator

Windows system manipulation tooling focused on red team tradecraft and evasion.

C++EDR EvasionRed Team
View Project โ†’

AV-EDR-checker

Host inspection utility for checking AV/EDR footprints via native Win32 interfaces.

PythonWin32APIRed Team
View Project โ†’

BinaryEntropyManipulation

Binary entropy tampering research for evasive executable modification workflows.

C++BinaryEvasion
View Project โ†’

Sandbox-Detection

Runtime sandbox and analysis-environment detection routines for payload safety checks.

CRed TeamEvasion
View Project โ†’

Defender-Removal

PowerShell project exploring Defender bypass logic in controlled red team labs.

PowerShellEDR BypassRed Team
View Project โ†’

GUID-spoof

GUID spoofing utility designed for identity obfuscation and AV bypass testing.

GoAVBypass
View Project โ†’

In Development

ReconPipe

Automated reconnaissance pipeline for subdomain enumeration, asset discovery, and attack surface mapping.

PythonReconAutomationOSINT

Status: Private for now

DomainWho

Domain intelligence and WHOIS enumeration tool for passive recon and target profiling workflows.

PythonOSINTReconWHOIS

Status: Private for now

Skills.

Languages

Core Languages

โžœ Python

Automation, tooling, and rapid exploit scripting โ€” primary language for most security workflows.

โžœ GO

High-performance C2 implants, network tools, and concurrent backend services.

โžœ C++

Low-level exploit development, shellcode, and performance-critical security research.

โžœ C#

Windows post-exploitation tooling, BOFs, and .NET-based offensive capabilities.

โžœ Rust

Memory-safe systems tooling โ€” used for the Neptun C2 framework and network utilities.

Additional Languages

โžœ Powershell, Bash, Lua, Batch

Learning in Progress

โžœ Assembly (ASM)

Deepening low-level execution knowledge for exploit dev, shellcode writing, and RE.

โžœ Zig

Systems-level alternative to C for writing lean, portable offensive tooling.

Favorite Tools

โžœ AdaptixC2 and Cobalt Strike

Primary C2s for red team ops โ€” beacon staging, lateral movement, and payload delivery.

โžœ Acunetix

Automated web scanning for initial surface coverage before manual testing.

โžœ nuclei

Custom template development for targeted vuln detection across large attack surfaces.

โžœ Ghidra

Static analysis and RE for binary targets, malware samples, and custom shellcode review.

โžœ Empire

PowerShell-based post-exploitation for Windows environments and AD attacks.

โžœ Wireshark

Traffic analysis for protocol-level debugging, C2 detection evasion testing, and pcap review.

โžœ Burp Suite

Manual web app testing โ€” custom extensions, active scanning, and request manipulation.

Expertise Areas

โžœ Exploit Development

Creating custom exploits and shellcode, including 0-day vulnerability research, evasion techniques, and process injection primitives.

โžœ Offensive Security Techniques

Penetration testing, privilege escalation, EDR/AV bypass, and post-exploitation across web, network, and binary targets.

โžœ Reconnaissance & Asset Discovery

Subdomain enumeration, API fuzzing, secret scanning, and cloud surface mapping using custom automation pipelines.

โžœ Reverse Engineering

Binary analysis, memory inspection, and behavioral analysis for vulnerability research and malware understanding.

Blog.

Technical articles coming soon.

I'm currently preparing content and will publish technical writeups soon.

Contact.

Get in touch

Interested in collaborating on cybersecurity projects or need expertise in penetration testing and network security? Feel free to reach out.

[Send Message]