Skip to content
View EynaExp's full-sized avatar
💭
Doing some nasty stuff
💭
Doing some nasty stuff

Block or report EynaExp

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
EynaExp/README.md

CyberSecurity Researcher | Malware Dev + Analyst

“Hide in the darkness, but do not remain there. Read the light, control the shadow.”

「闇に隠れ、されど闇にとどまらず。光を読んで、影を操れ。」

Typing SVG


^_^ About Me (自己紹介)

Red Teaming – TTP emulation, C2 frameworks, operational security.
Malware – evasion, loaders.
Constantly researching: kernel internals, Windows API, modern detection bypasses.

Disclaimer (技術)

All content shared is for educational & research purposes only.
Do not use any techniques or tools on systems without explicit permission.
I am not responsible for misuse.


(❁´◡`❁) Arsenal (技術)

Category Technologies / Interests
Languages C, ASM, Python, Batch, PowerShell
C2 Frameworks Covenant, Havoc, MSF, (custom C2 in the works)
Persistence Everything possible :)
Reversing IDA, Ghidra, x64dbg, dnSpy

🔥 Featured Projects (主要プロジェクト)

Devine-C2 – Custom C2 Framework
Sairento-Step – Advanced Persistence Framework for Windows
Exploit & POC – Custom Exploits and POCs
Loaders – Loaders for red team operations

:D More to come – stay tuned.


(O_O) GitHub Stats

GitHub stats
Top Langs


(U_U) Current Focus (現在の集中領域)

• Windows Internals
• Windows Programming
• Post Exploitation Techniques
• Active Directory Attacks


Contact / Disclosure

🔷 LinkedIn: Page


Remember: Know the law, stay ethical, hack with permission.

Pinned Loading

  1. CVE-2025-55182-POC CVE-2025-55182-POC Public

    Poc for CVE-2025-55182 (remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages)

    Python 5 1

  2. CVE-2024-27198-POC CVE-2024-27198-POC Public

    proof-of-concept mass scanner targeting JetBrains TeamCity instances affected by CVE-2024-27198

    Python 1

  3. Sairento-Step Sairento-Step Public

    Sairento-Step the complete stealth persist framework

    Batchfile 1

  4. LiquidEnd LiquidEnd Public

    A Platform To Store Accesses and Targets

    Python 1