Computer Science Engineering Student passionate about offensive and defensive cybersecurity research. I specialize in advanced threat simulation, evasion techniques, and low-level system security.
π Advanced Persistent Threat (APT) Development
π‘οΈ EDR/AV Evasion & Sandbox Detection
π§ Kernel-Level Security Research (Ring 0)
π» Malware Analysis & Reverse Engineering
β‘ Exploit Development & Vulnerability Research
- Reverse Engineering: Ghidra, WinDBG, IDA Pro
- Web Security: Burp Suite, Custom Fuzzers
- Malware Analysis: Custom toolchain development
- Kernel Development: Driver research, IOCTL hunting
- Cryptography: AES encryption, XOR schemes, API hashing
- CVE-2025-60419
- Audio-based Steganography Research paper
- APT Simulation Development
- Custom Binary Protocol Engineering for C2 communication
- Sandbox Detection & Bypass: Multi-layered detection mechanisms
- Memory Manipulation: DEP Bypass through drivers
- Signature Evasion: Polymorphic code generation, binary stripping
- Kernel Access: Why worry about evasion when you have Kernel CE ;)
- Audio-based Payloads: .wav file modulation for covert storage
- YouTube Audio C2: Innovative command channel via audio signatures
- Steganographic Methods: Image and audio-based data exfiltration
- BYOVD Techniques: Bring Your Own Vulnerable Driver exploitation
- Hardware Security: IOMMU bypass research, PCI manipulation
- Anti-Virus Targeting: Research on security driver vulnerabilities
graph TD
A[Initial Research] --> B[Proof of Concept]
B --> C[Integration into FeebleDream]
C --> D[Testing & Validation]
D --> E[Responsible Disclosure]
E --> F[Publication & Documentation]
π Google Cybersecurity Certificate - Coursera
π VirusTotal Research: Consistently achieving 0/72 detection rates
π Vulnerability Research: CVE-2025-60419 and four 0-days discovered aswell as re-discoveries such as CVE-2021-3438 & CVE-2024-33219
- Advanced EDR Evasion Techniques
- Kernel-Level Persistence Mechanisms
- Novel C2 Communication Channels
- Audio Steganography in Malware
- IOMMU Mapping for Misconfiguration
- RIP manipulation for greater device exposure
- BYOVD Hunting with several 0-days and rediscoveries found
- Vuln Stacking for higher primitives
Visit my blog for detailed technical writeups and research findings.
class SecurityResearcher:
def __init__(self):
self.current_focus = [
"Advanced Persistent Threat simulation",
"Zero-day research and exploitation",
"Novel evasion technique development",
"Kernel security mechanisms"
]
def research_philosophy(self):
return "Understand to defend, simulate to improve"I'm always interested in collaborating on:
- π Security research projects
- π‘οΈ Defensive and Offensive tool development
- π Educational security content
- π Vulnerability research initiatives
- π§ Email: [Priyan29@pm.me]
- π Blog: SplineUser.github.io