Skip to content
View reveng007's full-sized avatar
💩
Trying to code!
💩
Trying to code!

Block or report reveng007

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
reveng007/README.md

Hey there , I'm Soumyanil


LinkedIn Twitter

Check out: https://reveng007.github.io

About Me:

  • Hi, this is Soumyanil (aka reveng007).
  • Currently into Security Research. Though he has an electronics background, he is into information security.
  • Former Black Hat Asia, USA, SecTor & Europe 2024, Wild West Hacking Fest 2024 Arsenal Presenter and Former Speaker BSides Singapore 2023.
  • He has CRTP.
  • Nowadays, he spends most of his time building scripts/open source malware dev evasion-based projects, digging deep into Windows system internals, and building automation scripts on On-prem and Cloud-based (like, AWS) Attack Vectors.

Languages:

Python C C++ C# Visual Studio

Github Statistics:

Soumyani1's github stats

Pinned Loading

  1. DarkWidow DarkWidow Public

    Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird + Spawns a sacrificial Process as target process + (ACG+Bloc…

    C 574 77

  2. SharpGmailC2 SharpGmailC2 Public

    Our Friendly Gmail will act as Server and implant will exfiltrate data via smtp and will read commands from C2 (Gmail) via imap protocol

    C# 259 46

  3. reveng_rtkit reveng_rtkit Public

    Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypass infamous rkhunter antirootkit.

    C 237 51

  4. ReflectiveNtdll ReflectiveNtdll Public

    A Dropper POC with a focus on aiding in EDR evasion, NTDLL Unhooking followed by loading ntdll in-memory, which is present as shellcode (using pe2shc by @hasherezade). Payload encryption via System…

    C 167 23

  5. AMSI-patches-learned-till-now AMSI-patches-learned-till-now Public

    I have documented all of the AMSI patches that I learned till now

    C++ 68 11

  6. Learning-EDR-and-EDR_Evasion Learning-EDR-and-EDR_Evasion Public

    I will be uploading all the codes which I created with the help either opensource projects or blogs. This is a step by step EDR learning path for me.

    C++ 266 31