🕺About Me
Me, Myself and More....
👋 Hello There...
I am a graduate student at UTS Sydney, majoring in Cybersecurity. My passion lies in malware research, exploit development, and malware analysis. As an OSCP, CRTO and CRTL professional, I actively engage in vulnerability assessments, malware research, and cybersecurity projects.
Links: GitHub | LinkedIn | Twitter | ORCID
🏆 Certifications
💼 Experiences
Research Intern @ IIT Bhubaneswar
• Designed a distributed system that incorporates an agent-controller architecture to prevent data poisoning attacks. • Incorporated ECDH and zk-SNARK based authentication measures in the distributed system. • Implemented the distributed system in Golang using Gnark and Openssl libraries.
Security Engineer Intern @ Bugbase
Developed Active Directory internal assessment modules for RedTeam Copilot, enhancing the tool’s capability to simulate real-world attack scenarios
Created custom scripts for enumeration and exploitation in Sliver C2 using Sliverpy.
Automated deployment of expendable payloads, C2 redirectors, and SMTP relays using Terraform.
Contributed to the design and development of a custom C2 framework with AI-based agents.
Integrated netexec tool into the copilot agent for automated deployment when run on a target system.
Breach Point Intern @ ISAC
Conducted VAPT assessments on Government of India infrastructure.
Performed vulnerability scans for critical industrial sectors such as aviation, power, and finance.
Documented and responsibly disclosed proof-of-concept exploits for discovered vulnerabilities.
Promoted to team leader after two months, managing a team of interns and coordinating vulnerability assessments.
🎤 Conference Presentations
One Does Not Simply Write A Stable BOF @ CSECCON IV
Delivered a technical presentation on the intricacies of developing stable Beacon Object Files (BOFs) for command-and-control frameworks.
Analyzed common causes of BOF instability and outlined a comprehensive, 10-step methodology for ensuring BOF stability.
Highlighted the importance of using specialized tools like
boflintfor static analysis and thorough testing in controlled lab environments to ensure operational reliability.
The Threat Triplet: RATs, Keyloggers, and Registry Keys @ HINT-24
Demonstrated how RATs, keyloggers, and registry keys compromise systems together.
Explored persistence techniques used in modern malware.
Provided detection and mitigation strategies to counter these threats.
Research Paper was published in Springer Lecture Notes in Networks and Systems - LNNS
🔬 Publications
CurveLock: Exploring Elliptic Curves Implementation in Modern Ransomware (IEEE Access)
Investigated advanced anti-analysis and evasion techniques by manipulating the Windows OS at a low level, including API hammering and process hollowing.
Created a ransomware analysis prototype utilizing Elliptic Curve Cryptography (ECC) to encrypt files. It provided deep insights into how ECC can be misused.
Embedded mechanisms for escalating privileges, including token manipulation and abuse of high-privileged processes.
A Threat-Informed Approach to Malware Evasion using DRM and TLS Callbacks (IEEE Access)
Researched on a malware evasion attack chain, demonstrating how Digital Rights Management (DRM) and TLS callbacks can be repurposed to create stealthy threats.
Developed "ShadowChain," a proof-of-concept that locks itself to a specific PC using DRM, making it invisible to sandbox environments. It includes pre-execution anti-debugging with TLS callbacks and IAT camouflage to hide from security tools.
Demonstrated that the malware could bypass commercial antivirus software and thwart debuggers in a controlled lab setting.
The Threat Triplet: RATs, Keyloggers and Registry Keys—A Proof of Concept Analysis (Springer Lecture Notes in Networks and Systems)
Demonstrated the synergistic destructive potential of remote access trojans, keyloggers and registry keys.
Developed a proof-of-concept to show the aforementioned synergy and tested it in a controlled environment with multiple AV solutions.
Gave detection and prevention techniques to detect and prevent the unholy trinity.
®️Patents
System And Method For Detecting And Preventing Code Execution In Unauthorized Memory Regions.
Last updated


