Cybersecurity Researcher & Developer

Researching Advanced
Adversarial Tradecraft

Offensive security researcher specializing in tooling, exploit development, and advanced Active Directory tradecraft. Experienced in building complex attack labs, developing custom C2 capabilities in C/C++, and conducting applied security research. Certified across the full OSCE3 track, with a strong foundation in Windows internals, evasive tradecraft, and offensive engineering.

class FlamingoAgent:
  def __init__(self):
    self.skills = [
      "Offensive Security",
      "Malware Dev",
      "Reverse Engineering"
    ]
    self.certs = ["OSCP", "OSCE3", "CRTO"]

  def deploy(self):
    return "System Compromised"

Featured Projects

A collection of security tools, frameworks, and research I've worked on.

Evasive C2 Framework

Private

Python Security Agent

CTwobe

NetExec MSSQL Modules

Web App CVE (XSS)

Nopfuscator

Technical Arsenal

A comprehensive set of skills and tools I use to secure and compromise systems.

Offensive Security

  • Network Pentesting
  • Web App Security
  • Active Directory
  • Red Teaming
  • Evasion Techniques

Development

  • Python
  • C++
  • C#
  • x86 Assembly
  • C

Tools & Frameworks

  • Cobalt Strike
  • Sliver
  • Metasploit
  • Burp Suite
  • Ghidra
  • IDA Pro

Education

Master's in Cyber Security

Monash University

Expected Graduation: 2026

B.Tech in Computer Science

Vellore Institute of Technology

Graduated