He has hands-on offensive security professional with a strong focus on endpoint security evasion, cloud attack automation, and red teaming.
His work involves building offensive pipelines, performing stealthy assessments, and uncovering deep product blind spots across EDRs, AVs, privileged access management solutions and other Security products.
Nowadays, he spends most of his time building scripts/open source malware dev evasion-based projects, digging deep into Windows system internals, and building automation scripts on On-prem and Cloud-based (like, AWS) Attack Vectors.
What I do:
Break and bypass endpoint defenses like Microsoft Defender for Endpoint, CrowdStrike, Cortex XDR, Sophos, Deep Instinct and BeyondTrust.
Simulate adversary behavior using offensive CI/CD pipelines to generate obfuscated payloads (.NET).
Perform deep assessments in enterprise environments using live SharePoint exploitation via KQL hunting, and AD abuse (evading Microsoft Defender for Identity).
Build malware and mini-ransomware strains to test real-world detection and prevention systems.
Automate adversary emulation in cloud platforms like AWS for continuous attack simulations.
Projects I have worked on:
SharePoint Keyword Hunting:
Queried live enterprise SharePoint sites using Microsoft Graph API + KQL (Keyword Query Language) to identify exposed sensitive data.
WPAD Assessment:
Investigated WinHttpAutoProxySvc attack surface under disabled WPAD configs.
MDE Exclusion Bypass:
Evaluated Microsoft Defender Exclusion visibility and abuse even under “HideExclusionsFromLocalAdmins” policy.
Privilege Access Management Product Abuse:
Discovered multiple UAC bypasses in Beyond Trust PAM solution while operating under restricted (low-flex) environments.
Windows 11 Endpoint Evaluation:
Performed holistic endpoint security review including Zscaler, DLP, MDE, and Beyond Trust.
Assessment of MDI via AD Attacks:
Ran 400+ test cases on Microsoft Defender for Identity involving ADCS, Kerberoasting, ACL abuse, and more.
Cloud Attack Automation (AWS):
Built adversary simulation tooling for FireCompass’ automation platform.
Malware & Ransomware Tooling:
Developed stealthy ransomware and evasive malware strains for internal red team assessments.