Skip to content

SplineUser/SplineUser

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

5 Commits
Β 
Β 

Repository files navigation

πŸ‘‹ Hello, I'm Priyan

Blog

πŸ” Security Research & Engineering

Computer Science Engineering Student passionate about offensive and defensive cybersecurity research. I specialize in advanced threat simulation, evasion techniques, and low-level system security.

🎯 Research Focus Areas

πŸ” Advanced Persistent Threat (APT) Development
πŸ›‘οΈ EDR/AV Evasion & Sandbox Detection
πŸ”§ Kernel-Level Security Research (Ring 0)
πŸ’» Malware Analysis & Reverse Engineering
⚑ Exploit Development & Vulnerability Research

πŸ› οΈ Technical Arsenal

Programming Languages

Python C C++ Assembly

Security Tools & Frameworks

  • Reverse Engineering: Ghidra, WinDBG, IDA Pro
  • Web Security: Burp Suite, Custom Fuzzers
  • Malware Analysis: Custom toolchain development
  • Kernel Development: Driver research, IOCTL hunting
  • Cryptography: AES encryption, XOR schemes, API hashing

πŸ”¬ Recent work

  • CVE-2025-60419
  • Audio-based Steganography Research paper
  • APT Simulation Development
  • Custom Binary Protocol Engineering for C2 communication

🎭 Advanced Evasion Techniques

  • Sandbox Detection & Bypass: Multi-layered detection mechanisms
  • Memory Manipulation: DEP Bypass through drivers
  • Signature Evasion: Polymorphic code generation, binary stripping
  • Kernel Access: Why worry about evasion when you have Kernel CE ;)

🎡 Novel C2 Communication

  • Audio-based Payloads: .wav file modulation for covert storage
  • YouTube Audio C2: Innovative command channel via audio signatures
  • Steganographic Methods: Image and audio-based data exfiltration

⚑ Kernel Security Research

  • BYOVD Techniques: Bring Your Own Vulnerable Driver exploitation
  • Hardware Security: IOMMU bypass research, PCI manipulation
  • Anti-Virus Targeting: Research on security driver vulnerabilities

πŸ“ˆ Research Methodology

graph TD
    A[Initial Research] --> B[Proof of Concept]
    B --> C[Integration into FeebleDream]
    C --> D[Testing & Validation]
    D --> E[Responsible Disclosure]
    E --> F[Publication & Documentation]
Loading

πŸ† Certifications & Achievements

πŸŽ“ Google Cybersecurity Certificate - Coursera
πŸ“Š VirusTotal Research: Consistently achieving 0/72 detection rates
πŸ” Vulnerability Research: CVE-2025-60419 and four 0-days discovered aswell as re-discoveries such as CVE-2021-3438 & CVE-2024-33219

πŸ“ Knowledge Sharing

Recent Work

  • Advanced EDR Evasion Techniques
  • Kernel-Level Persistence Mechanisms
  • Novel C2 Communication Channels
  • Audio Steganography in Malware
  • IOMMU Mapping for Misconfiguration
  • RIP manipulation for greater device exposure
  • BYOVD Hunting with several 0-days and rediscoveries found
  • Vuln Stacking for higher primitives

Visit my blog for detailed technical writeups and research findings.

πŸ”„ Current Focus

class SecurityResearcher:
    def __init__(self):
        self.current_focus = [
            "Advanced Persistent Threat simulation",
            "Zero-day research and exploitation",
            "Novel evasion technique development",
            "Kernel security mechanisms"
        ]
    
    def research_philosophy(self):
        return "Understand to defend, simulate to improve"

πŸ“Š GitHub Stats

SplineUser's GitHub stats

Top Langs

🀝 Collaboration & Contact

I'm always interested in collaborating on:

  • πŸ” Security research projects
  • πŸ›‘οΈ Defensive and Offensive tool development
  • πŸ“š Educational security content
  • πŸ” Vulnerability research initiatives

πŸ“¬ Let's Connect!


"In security research, understanding the attack is the first step to building better defenses"

Profile Views

About

My awesome profile

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors