“Hide in the darkness, but do not remain there. Read the light, control the shadow.”
「闇に隠れ、されど闇にとどまらず。光を読んで、影を操れ。」
Red Teaming – TTP emulation, C2 frameworks, operational security.
Malware – evasion, loaders.
Constantly researching: kernel internals, Windows API, modern detection bypasses.
Disclaimer (技術)
All content shared is for educational & research purposes only.
Do not use any techniques or tools on systems without explicit permission.
I am not responsible for misuse.
| Category | Technologies / Interests |
|---|---|
| Languages | C, ASM, Python, Batch, PowerShell |
| C2 Frameworks | Covenant, Havoc, MSF, (custom C2 in the works) |
| Persistence | Everything possible :) |
| Reversing | IDA, Ghidra, x64dbg, dnSpy |
Devine-C2 – Custom C2 Framework
Sairento-Step – Advanced Persistence Framework for Windows
Exploit & POC – Custom Exploits and POCs
Loaders – Loaders for red team operations
:D More to come – stay tuned.
• Windows Internals
• Windows Programming
• Post Exploitation Techniques
• Active Directory Attacks
🔷 LinkedIn: Page
Remember: Know the law, stay ethical, hack with permission.