Red team tool developer focused on Linux offensive security. I build practical, weaponized tools that demonstrate real-world attack vectors.
- Evasion techniques (AV/EDR bypass, Sandbox detection, Anti-debugging)
- Payload delivery systems (Obfuscation, Multi-stage droppers, Living-off-the-land)
- Post-exploitation (Privilege escalation, Persistence mechanisms, Lateral movement)
- Covert channels (DNS tunneling, ICMP exfiltration, HTTPS C2)
- Shellcode development (Position-independent, Polymorphic, Encoded)
- Credential harvesting (Memory scraping, Keylogging, Token manipulation)
- Anti-forensics (Log wiping, Timestomping, Memory trampolines)
| Component | Version | Check Command |
|---|---|---|
| OS | Linux amd64 x86_64 | uname -a |
| Glibc | 2.42 | ldd --version | head -1 |
| Python | 3.13.12 | python3 --version |
| GCC | 15.2.0 | gcc --version | head -1 |





