Adversary emulation specialist. I break systems to understand them — crafting custom exploits, stealthy payloads, and bypassing modern EDR/AV to harden defenses that truly hold.
I'm a Red Teamer and Ethical Hacker with deep expertise in adversary emulation — the craft of thinking, moving, and operating exactly like a real-world threat actor to expose what defenses miss.
My core work lives at the intersection of Malware Development and Reverse Engineering. I build custom offensive tooling in C/C++ and x64 Assembly, dissect binaries to understand attacker tradecraft, and craft payloads engineered to survive hostile environments.
From Windows Internals and kernel-level exploitation to orchestrating complex Social Engineering campaigns and network penetration tests — I'm driven by one goal: find the breach before an adversary does.
// type 'help' to see available commands
Looking for a Red Teamer who thinks like an adversary and delivers results that harden what matters? Let's talk.