Red Team Operator
Pentesting, offensive security research, tool development. C2 frameworks, AD exploitation, EDR evasion, Malware, Adversary emulation.
Red team operator specialized in Adversary simulation exercises and offensive tool development. R&D in EDR evasion, custom C2 framework development, exploitation of complex multi-domain Active Directory environments.
Personal research in malware development, Windows internals, top-tier EDR evasion.
Theoretical deep dive into full sleep obfuscation: code encryption via dual-mapping, thread stack spoofing, heap encryption through signed-DLL primitives.
Deep dive into .pdata, UNWIND_INFO, and building fake stack frames that bypass CrowdStrike's RtlVirtualUnwind validation.
A technique addressing all four EDR detection layers: userland hooks, call stack analysis, stack walking validation, and behavioral patterns.
Certified Penetration Testing Specialist | HackTheBox
Certified Red Team Operator | Zero-Point Security
Malware Development Academy | MalDev Academy
Certified Red Team Expert | Altered Security