I am an offensive security researcher focused on real-world adversary simulation across web, endpoint, and network environments. My work spans malware development and analysis, exploitation, and advanced penetration testing, backed by strong engineering in Python, C++, JavaScript, PowerShell, and SQL operating from a defender’s perspective—leveraging SOC tradecraft, threat intelligence, and reverse engineering to emulate nation-state and criminal attack patterns—helping government and private organizations harden our country's critical cyber infrastructure against real threats.
I emulate real adversaries by developing exploits, malware, and attack chains to breach systems the way threat actors actually do. The goal is not just to get in, but to stay in, move laterally, and prove real business and national-level risk.
I design and operate detection and response capabilities that catch, contain, and eradicate advanced intrusions. This includes telemetry engineering, SOC workflows, threat hunting, and turning attacker behavior into actionable alerts.
I force the red and blue sides to collide by validating detections against real attacks and fixing what fails. Every technique used by red is measured, tuned, and converted into defensive capability so gaps don’t stay theoretical.
Offensive security, research, and engineering across real-world attack surfaces
Custom malware, loaders, command-and-control infrastructure, and evasion frameworks built for real adversary emulation.
Authentication bypasses, RCE chains, SSRF, deserialization bugs, API abuse, and cloud attack paths.
SIEM and EDR validation, detection tuning, and blue-team feedback driven by real attack telemetry.
Malware analysis, exploit development, protocol abuse, and adversary tradecraft research.
Mastery of cutting-edge technologies and frameworks
Ready to transform your vision into reality? Let's connect.