Bypassing EDR
An in-depth analysis of user-mode hooks and novel techniques for silent execution.

I am a dedicated Cyber Security Specialist based in Sana'a, Yemen, with a razor-sharp focus on Red Teaming and Offensive Security. My career is defined by a pursuit of understanding the adversary—not just their tools, but their mindset.
Currently serving as the Red Team Lead at DeepSafer, I architect and execute sophisticated adversary simulation programs. My role is to mentor operators and align offensive strategies with organizational risk models. Previously, as an Offensive Tools Developer, I built custom exploitation frameworks.
Beyond operations, I believe in knowledge transfer. As a former Lecturer at Al-Razi University, I taught the next generation the fundamentals of ethical hacking and network security.
My background in both detection engineering and red teaming allows me to simulate attacks that are realistic and impactful, directly improving Blue Team capabilities.
Reliance on public tools is a liability. I specialize in developing custom malware and loaders in Go, C, and Nim to bypass EDR and static analysis.
As a Multi-Cloud Red Team Analyst (MCRTA), I extend the kill chain into AWS and Azure, exploiting misconfigurations and identity providers.
Security is a moving target. I maintain an active research posture, constantly updating my tradecraft with the latest TTPs.
Full-spectrum simulation of APT TTPs. Specializing in cloud red teaming (MCRTA), EDR evasion, and custom C2 infrastructure.
Development of evasive payloads using Golang, C++, and Nim. Expertise in reverse engineering and neutralizing threats.
Deep expertise in Azure and AWS environments. Identifying misconfigurations, IAM privilege escalation, and attack paths.
Building robust detection mechanisms, SOC log analysis, SIEM tuning, and writing YARA rules.
Manual and automated assessments to uncover logic flaws, injection points, and auth bypasses.
Testing human resilience through spear-phishing and security assessments.
Lead full-spectrum adversary simulation programs, architect red team strategies, and mentor operators.
Instructed on cybersecurity fundamentals, ethical hacking methodologies, and penetration testing tools.
Developed detection mechanisms, tuned SIEM alerts, and created robust YARA rules for malware identification.
An in-depth analysis of user-mode hooks and novel techniques for silent execution.
Leveraging serverless functions to mask C2 traffic against advanced network forensics.
Case study on replicating the operational tradecraft of North Korean state-sponsored actors.
For sensitive inquiries or collaboration.