Documenting offensive security research, red team tradecraft, and privacy analysis. All operations are authorized. All findings are disclosed responsibly.
DOJ charged ex-US intel for UAE spyware. One was ExpressVPN's CIO — revealed one day after Kape bought ExpressVPN for $936M. The adware company that now holds the keys to your traffic.
Timestamps are just metadata — and metadata is incredibly easy to manipulate. Understanding $STANDARD_INFORMATION vs $FILE_NAME and why clumsiness leaves more evidence than doing nothing.
Deleting a file doesn't make it disappear. On HDDs the data stays until overwritten. On modern SSDs with TRIM + encryption, it's usually gone for good. The real story is more nuanced.
Surveillance no longer asks "what did you do?" It asks "what will you do?" Your behavioral fingerprint predicts and pre-judges you before you've acted.

North Korean APT weaponizing fake GitHub job repos. A red team simulation of the full chain — social engineering, XOR-encrypted payloads, and silent C2 via npm postinstall.
A social engineering technique that tricks victims into pasting a disguised PowerShell command into File Explorer. No exploits. No admin rights. Just OS trust and bad habits.

Multi-stage HTA phishing simulation using only native Windows binaries. No implants, no custom executables — just mshta.exe, WScript, PowerShell, and registry persistence.
Writing mostly because I 'love' it. Research notes, techniques, and deep dives into offensive security and privacy.
Kape Technologies — formerly Crossrider adware — now owns ExpressVPN, PIA, CyberGhost, and the review sites that rank them.
$SI vs $FN attributes, nanosecond precision, double timestomping, and why the MFT sequence number exposes you anyway.
shred, cipher /w, hdparm Secure Erase, and why physical destruction is the only guarantee at high threat models.
Behavioral fingerprinting, correlation pipelines, and how opting out itself becomes a flag.
Why metadata beats content. How connection graphs expose power dynamics, leadership, and identity — even without reading a single message.
Proton, Tuta, SimpleLogin, self-hosted — every option has a different threat surface. Understanding what each actually protects.

North Korean APT job scam methodology — malicious postinstall scripts, XOR-encrypted Python reverse shells, C++ C2 listener. Full chain documented.
A ClickFix variant. Phishing page that copies a hidden PowerShell command to clipboard, disguised as a file path. Zero exploits, zero footprint until execution.

HTA → VBScript → hidden PowerShell → registry persistence. A full multi-stage attack chain using zero custom binaries. MITRE ATT&CK techniques documented.
Custom security tools built for red team operations and research. All open source. Use responsibly.
Red-team focused PE analysis tool that detects evasion techniques, anti-analysis patterns, and suspicious characteristics in Windows executables. Detects direct syscall patterns, API hashing, RWX sections, reflective DLL loaders, AMSI bypass patterns, and ETW patching indicators with weighted risk scoring.
GitHub →Static-analysis tradecraft classifier for Windows loaders. Analyzes PE files to identify execution models, injection intent, API resolution methods, payload styles, and evasion posture. Classifies how a binary plans to execute code and what execution philosophy the author uses.
GitHub →Automated malware analysis reporting engine that translates technical findings into professional, human-readable reports. Generates deterministic reports in Markdown, HTML, or PDF formats with specialized sections for evasion techniques and execution philosophies.
GitHub →// All tools are open source and available on GitHub
// Contributions and feedback are welcome
// Use responsibly and ethically
Penetration tester and security researcher focused on offensive operations and privacy research.
I write about red team tradecraft, anti-forensics, privacy, and occasionally document APT techniques through controlled simulations.
All research is conducted in authorized environments or on personal lab infrastructure.
Content is published for educational and defensive awareness purposes.
> Authorized access only
> All operations are logged