π΄ Red Team Operations & Adversary Simulation π§ Windows Internals (User / Kernel Mode) π§ͺ Payload Development & Evasion Tradecraft
I am an Advanced Penetration Tester specializing in Red Team operations, focusing on simulating real-world attacks within enterprise environments and identifying vulnerabilities before adversaries can exploit them.
I develop custom payloads using C and ASM, build and modify malware leveraging advanced Evasion techniques, and utilize Windows Native API to enhance attack effectiveness and analyze target systems with high precision. Additionally, I manage and customize C2 infrastructure using Mythic, modifying agents, beacon behavior, and communication patterns instead of using default configurations, making traffic more realistic and harder to detect within networks.
I focus on emulating advanced threat behaviors through custom tool development, deep system analysis, and delivering actionable insights that help organizations strengthen their security posture. π
π‘ Key Strengths: β’ Conducting advanced Red Team operations on networks and systems β’ Developing and testing custom malware and payloads using C and ASM β’ Managing and customizing C2 infrastructure via Mythic, including agents, beacon behavior, and communication patterns β’ Implementing advanced Evasion techniques to avoid detection and simulate realistic attacks β’ Analyzing and exploiting systems using Native API to enhance attack effectiveness and understand target environments deeply β’ Delivering comprehensive security assessments with actionable recommendations to improve defenses
I am a Red Team Operator focused on realistic adversary emulation and offensive security research to improve defensive capabilities.
- Networking Fundamentals (TCP/IP, DNS, HTTP, Active Directory)
- Linux & Windows Fundamentals
- Penetration Testing Methodology
- Adversary Emulation & MITRE ATT&CK
- Initial Access Techniques
- Lateral Movement & Pivoting
- Privilege Escalation
- Persistence & Defense Evasion
- Command & Control (C2) Concepts
- Operational Security (OPSEC)
- User Mode vs Kernel Mode Architecture
- Windows API vs Native API vs Syscalls
- PE File Structure
- Process, Thread, Handle, Token Internals
- Memory Management & Virtual Memory
- NTDLL, System Calls, Kernel Transitions
- Driver Communication Basics
- C / C++
- C#
- Python
- Go
- PHP
- Assembly (x86/x64)
- Bash
- JavaScript
- Metasploit, Sliver, Cobalt Strike, Brute Ratel, Mythic (lab)
- Impacket, CrackMapExec, BloodHound
- Nmap, Burp Suite, Wireshark
- Volatility, WinDbg, x64dbg, IDA, ImmunityDebugger, ghidra
- Docker, Git
