about skills certs academy projects blog lab ctf contact resume.pdf ↗
// RED TEAM OPERATOR

Piyusha
Akash

Ethical Hacker · Malware Developer · Reverse Engineer

Adversary emulation specialist. I break systems to understand them — crafting custom exploits, stealthy payloads, and bypassing modern EDR/AV to harden defenses that truly hold.

Available for Red Team Engagements
Windows Internals · Win32 API
Exploit & Malware Dev
01

About Me

I'm a Red Teamer and Ethical Hacker with deep expertise in adversary emulation — the craft of thinking, moving, and operating exactly like a real-world threat actor to expose what defenses miss.

My core work lives at the intersection of Malware Development and Reverse Engineering. I build custom offensive tooling in C/C++ and x64 Assembly, dissect binaries to understand attacker tradecraft, and craft payloads engineered to survive hostile environments.

From Windows Internals and kernel-level exploitation to orchestrating complex Social Engineering campaigns and network penetration tests — I'm driven by one goal: find the breach before an adversary does.

adversary_emulation evasion_tactics win32_api shellcode_dev threat_research asm_internals
operator_profile.c
/* Piyusha Akash — Red Team Operator */

typedef struct {
  LPCSTR  role      = "Red Teamer";
  LPCSTR  focus[4] = {
    "Malware Dev",
    "Exploit Dev",
    "Rev Eng",
    "Evasion"
  };
  BOOL    available = TRUE;
  BOOL    hireable  = TRUE;
} OPERATOR;

// Status: actively hunting
02

Technical Arsenal

// PROGRAMMING LANGUAGES
// SKILLS & EXPERTISE
03

Certifications

Hackviser
Offensive Security Certification · 1 credential
🎯
Red Team Leaders
Offensive Security Specialization · 1 credential
COWA
Certified Offensive Windows API
Advanced Windows API exploitation, process injection, DLL hijacking, and offensive tooling development using native Win32 and NT APIs.
🔒
CISCO Network Academy
Networking & Security · 3 credentials
CISCO
Introduction to Cybersecurity
Foundational cybersecurity concepts, threat landscape, attack vectors, and defensive security practices.
CISCO
Computer Hardware Basics
Hardware fundamentals, system architecture, and component-level understanding for security practitioners.
CISCO
Getting Started with Packet Tracer
Network simulation, topology design, and hands-on configuration skills using Cisco Packet Tracer.
🛡️
Security Blue Team
Defensive Security Training · 2 credentials
SBT
Introduction to OSINT
Open-source intelligence gathering techniques, target profiling, and passive reconnaissance methodology.
SBT
Introduction to Virtual Machines
Virtualization fundamentals, hypervisor types, and secure isolated lab environment setup for security research.
⚙️
OPSWAT Academy
Critical Infrastructure Protection · 1 credential
OPSWAT
Introduction to Cybersecurity
Core security principles, threat landscape, and critical infrastructure protection fundamentals.
🐧
Linux Foundation
Open Source & Linux Expertise · 1 credential
LFS101
Introduction to Linux
Linux fundamentals, shell usage, filesystem navigation, process management, and system administration essentials.
04

Project Portfolio

05

Interactive Lab

// type 'help' to see available commands

piyusha@native-framework — ~
██████╗ ██╗██╗ ██╗██╗ ██╗███████╗██╗ ██╗ █████╗ ██╔══██╗██║╚██╗ ██╔╝██║ ██║██╔════╝██║ ██║██╔══██╗ ██████╔╝██║ ╚████╔╝ ██║ ██║███████╗███████║███████║ ██╔═══╝ ██║ ╚██╔╝ ██║ ██║╚════██║██╔══██║██╔══██║ ██║ ██║ ██║ ╚██████╔╝███████║██║ ██║██║ ██║ ╚═╝ ╚═╝ ╚═╝ ╚═════╝ ╚══════╝╚═╝ ╚═╝╚═╝ ╚═╝
// Piyusha Akash — Red Team Operator · v2.0 · Type 'help' to begin
piyusha@native-framework:~$
06

CTF Platforms

// LET'S WORK TOGETHER

Ready to
Breach.

Looking for a Red Teamer who thinks like an adversary and delivers results that harden what matters? Let's talk.