Offensive Security Engineer Β· Red Team Operator Β· Malware Developer
Building advanced security tools in Go, Rust, C#, and PowerShell
Offensive security professional focused on red team operations, evasion techniques, and building security tooling. I develop open-source tools for penetration testing, security research, and AI-powered automation.
| Area | Skills |
|---|---|
| Offensive | BYOVD, Process Injection, AMSI Bypass, AES Encryption, Shellcode Loaders |
| AI / ML | LangChain, MCP (Model Context Protocol), LLM Agents, RAG |
| Infrastructure | Docker, Nginx, AWS, CI/CD |
| Project | Description | Tech | Stars |
|---|---|---|---|
| Shell-Custom | Defense-evasion reverse shell with bypass capabilities | PowerShell | β 13 |
| AmsiResurrect | AMSI bypass via resurrection technique with C2 integration | C# | β 12 |
| AesGo | AES encryption library for offensive Go tooling | Go | β 10 |
| Amsi-Go | In-memory AMSI patcher for red team operations | Go | β 9 |
| 3X-Shell | AES-encrypted TCP reverse shell for pentesting | Go | β 9 |
| RustLoader | Advanced shellcode loader with anti-debugging and evasion | Rust | β 6 |
| NeuronC2 | Command & Control framework powered by MCP | Go | β 5 |
| WatchDog Killer | BYOVD process termination for security research | Rust | β 4 |
