Enenra

Red Team Operator

Pentesting, offensive security research, tool development. C2 frameworks, AD exploitation, EDR evasion, Malware, Adversary emulation.


Offensive security, research & tooling

Red team operator specialized in Adversary simulation exercises and offensive tool development. R&D in EDR evasion, custom C2 framework development, exploitation of complex multi-domain Active Directory environments.

Personal research in malware development, Windows internals, top-tier EDR evasion.


Recent writings

Evasion 2026

Shinkiro: Matched-Gadget Indirect Syscalls With APC Execution

A technique addressing all four EDR detection layers: userland hooks, call stack analysis, stack walking validation, and behavioral patterns.


Credentials

CPTS

Certified Penetration Testing Specialist — HackTheBox

CRTO

Certified Red Team Operator — Zero-Point Security

MALDEV

Malware Development Academy — MalDev Academy

CRTE

Certified Red Team Expert — Altered Security