I provide white-box penetration testing and code review services to a limited number of clients each year. My goal is to identify vulnerabilities and logic flaws in the source code that could lead to current or future security issues. Beyond detection, I work closely with development teams to help remediate these issues effectively.
My work in malware research focuses on dissecting and understanding the inner workings of malicious software through reverse engineering. By analyzing their behavior, functionality, and impact, I document key findings that provide valuable insights into how these threats operate.
I offer penetration testing services (Black Box, Grey Box) to identify vulnerabilities by simulating real-world attacks on your digital infrastructure. I provide tailored training sessions and strategic security guidance helping them build long-term cybersecurity capabilities and make informed decisions.
I am actively involved in open-source projects related to InfoSec, with a particular focus on malware research. By contributing to and collaborating within the community, I help develop tools and techniques that enhance our understanding and defense against malicious software and evolving cyber threats.
These are professional services offered to a limited number of clients per year. Services not marked with this icon represent self-financed initiatives, completely free, ad-free, and developed independently on my free time. Feel free to contact me for further details or specific inquiries.
This C# demo enables interactive shell access to a remote system via SMB named pipes, with optional AES GCM encryption. Intended for educational use, not production deployment.
More
Secure remote desktop application for Microsoft Windows entirely written in PowerShell for the server and a cross-platform client.
More
Complete and Optimized Remote Desktop Application Entirely Coded in PowerShell (Multi-Screen, Keyboard Sync, Mouse Sync, Clipboard Sync, and More)
MorePowerRunAsSystem is a PowerShell script that runs commands or interactive processes as SYSTEM using native Windows features, without third-party tools like PsExec.
More
Comprehensive C# Project to Understand the Concept of Malware Command and Control (C2) Using FTP as a Communication Channel.
More
Open-Source Application for Comprehensive Search and Exploration of Windows DLL Exported Functions for Malware Research and Analysis.
More
A faithful remake of the infamous SubSeven Remote Access Tool, version 2.2, originally released in the early 2000s.
MoreThis module runs a process as another user using known credentials, attaching input/output to the caller's console. It also functions as a standalone script.
More
Malware Museum: Showcasing the Most Impactful Malware from the 1990s to the Early 2000s. Get Ready to Journey Back to the Golden Age of Malware.
More
Comprehensive Search Engine for Malware Evasion Techniques (Documentation, Code Snippets, YARA Rules, and More)
More
Optix is a secure, open-source (GPLv3) multi-purpose Remote Access Tool for Windows. It operates using reverse connections and supports OpenSSL for securing communications between the server and its clients through mutual authentication (mTLS).
More
Indirect Memory Writing
|
Unprotect Project | Delphi | Sept. 30, 2025 |
Get File Type Description
|
Malware Gallery | Delphi | Sept. 17, 2025 |
Get File Time Information
|
Malware Gallery | Delphi | Sept. 17, 2025 |
Expand Env Variables In Path
|
Malware Gallery | Delphi | Sept. 17, 2025 |
Get Lan Group Name
|
Malware Gallery | Delphi | July 4, 2025 |
Search for Registry Keys / Values
|
Malware Gallery | Delphi | June 12, 2025 |
Dump Process Memory via MiniDumpWriteDump
|
Malware Gallery | Delphi | June 11, 2025 |
Dump Process Memory via ReadProcessMemory
|
Malware Gallery | Delphi | June 9, 2025 |
Enumerate Local Process Modules via PEB
|
Malware Gallery | Delphi | June 2, 2025 |
Enumerate Remote Process Modules via PEB
|
Malware Gallery | Delphi | June 2, 2025 |
whoami
eCMAP - Certified Malware Analysis Professional
SLAE32 - SecurityTube Linux Assembly Expert 32
C|EH - Certified Ethical Hacker
Embarcadero Certified Delphi Developer