reveng007's Blog

Central Point for Research and Development


Project maintained by reveng007 Hosted on GitHub Pages — Theme by mattgraham
Bat Image

About Me:

What I do:

  1. Break and bypass endpoint defenses like Microsoft Defender for Endpoint, CrowdStrike, Cortex XDR, Sophos, Deep Instinct and BeyondTrust.
  2. Building detections of high quality attack techinques used by APT which normally goes under the radar of EDR products and Threat Hunters.
  3. Simulate adversary behavior using offensive CI/CD pipelines to generate obfuscated payloads (.NET).
  4. Perform deep assessments in enterprise environments using live SharePoint exploitation via KQL hunting, and AD abuse (evading Microsoft Defender for Identity).
  5. Have built malwares and ransomware to test real-world environments for upgrdation of detection and prevention strategies.
  6. Automate adversary emulation in cloud platforms like AWS for continuous attack simulations.

Projects I have worked on:

  1. Detection Engineering via Event logs (high level), Kernel Callback and ETWTi based ELAM drivers (low level):
    Built Kernel drivers POCs and ETWTi based ELAM (Early Launch AntiMalware) drivers to detect process injection techniques like, thread hijacking, EarlyBird APC Injections, LSASS memory access (also for Silent process exit and Duplicate handle technique), PPID Spoofing and Process Hollowing, Ghosting, Herpaderping, LLMNR poisoning, Ransomware detection workflow, Named pipe based privilege escalation and lateral movement.
  2. SharePoint Sensitive Keyword Hunting:
    Queried live enterprise SharePoint sites using Microsoft Graph API + KQL (Keyword Query Language) to identify exposed sensitive data.
  3. WPAD Assessment:
    Investigated WinHttpAutoProxySvc attack surface under disabled WPAD configs.
  4. MDE Exclusion Bypass:
    Evaluated Microsoft Defender Exclusion visibility and abuse even under “HideExclusionsFromLocalAdmins” policy.
  5. Privilege Access Management Product Abuse:
    Discovered multiple UAC bypasses in Beyond Trust PAM solution while operating under restricted (low-flex) environments.
  6. Windows 11 Endpoint Evaluation:
    Performed holistic endpoint security review including Zscaler, DLP, MDE, and Beyond Trust.
  7. Assessment of MDI via AD Attacks:
    Ran 400+ test cases on Microsoft Defender for Identity involving ADCS, Kerberoasting, ACL abuse, and more, having 89% success rate in bypassing MDI.
  8. Cloud Attack Automation (AWS):
    Built adversary simulation tooling for FireCompass’ automation platform.
  9. Malware & Ransomware Tooling:
    Developed stealthy ransomware and evasive malware strains for internal red team assessments.

Courses/ Certifications:


GitHub followers
reveng007's github stats

LinkedIn Twitter


$ cat /var/www/html/index.html

View my My list of posts !

$ cat /var/www/html/redirect/index.html

View my blogs on other platforms:

  1. Kerberos Deep Dive (original website is sold, so had to add backup)
  2. HTB Knife (original website is sold, so had to add backup)
  3. THM Steel Mountain MrRobot
  4. THM NinjaSkills
  5. THM TheServerFromHell