// About // Skills // Research // Blog // Cheatsheets // Contact

Security Research & Deep Dives

Attack techniques, tooling breakdowns, and original research covering EDR evasion, Active Directory, Windows internals, and cloud security. Content you won't find elsewhere.

Persistence Active Directory Windows
Mar 2026 · 18 min read

Persistence Atlas: 19 Techniques Nobody Talks About

Shadow Credentials, AdminSDHolder backdoors, DCSync ACL delegation, Time Provider DLLs, AMSI Provider registration, Credential Provider DLLs — a complete reference of persistence vectors that fly under every defender's radar. Full implementation with commands.

T1098.001 T1547.003 T1546.015 T1003.006
Read article
EDR Bypass Malware Dev C++
Feb 2026 · 22 min read

Building Chimera: An EDR Evasion Framework from Scratch

How I built a 12-technique EDR bypass toolkit in C++17 and MASM. Covers AMSI bypass (3 methods), ETW patching, NTDLL unhooking via NtOpenSection, direct and indirect syscalls via Hell's Gate / Halo's Gate, process hollowing, module stomping, and sleep obfuscation.

T1562.001 T1562.006 T1055 T1027.011
Read article
C2 Infrastructure Python
Apr 2026 · 12 min read

GitHub Gist as C2: Living-off-the-Cloud Infrastructure

Building a stealthy C2 channel using GitHub Gist as the communications medium. Operator console, implant beacon, command dispatching — all over the GitHub API. Traffic blends with normal developer activity. Plus OPSEC considerations and detection signals.

T1102.001 T1071.001
Read article
Azure AD Cloud Identity
Jan 2026 · 20 min read

Azure AD Attack Surface: The Complete Red Team Guide

Full breakdown of the Entra ID attack surface — service principal abuse, OAuth2 consent phishing, app role escalation, conditional access bypass, PRT theft, and Cross-Tenant access abuse. How to find and exploit every misconfiguration a real engagement would target.

T1078.004 T1528 T1550.001
Read article