Skip to content
View reveng007's full-sized avatar
💩
Trying to code!
💩
Trying to code!
Block or Report

Block or report reveng007

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
reveng007/README.md

Hey there , I'm Soumyanil


LinkedIn Twitter

Check out: https://reveng007.github.io

About Me:

  • Hi, I'm Soumyanil (aka reveng007).
  • Currently into Security Research. Though I have an electronics background, I am into information security.
  • Former Speaker BSides Singapore 2023, Black Hat Asia 2024 Presenter.
  • Also got invitation as a speaker from BSides St. Pete (Florida) 2023, BSides Prishtina (Kosovo) 2023/2024, BSides Boise (Idaho) 2024, Hackmiami Conference XI 2024 and ConfidenceConf 2024, Krakow, Poland.
  • I'm learning new stuff day in and day out. I'm passionate about offensive security more than defensive.
  • I have played CTFs, solved 100+ rooms in TryHackMe till now. I have CRTP.
  • Now a day, I am spending most of the time building scripts/open source malware dev evasion based projects, digging deep into windows system internals, building scripts on On-prem and Cloud-based (like, AWS) Attack Vectors.

Languages:

Python C C++ C# Visual Studio

Github Statistics:

Soumyani1's github stats

Pinned

  1. DarkWidow DarkWidow Public

    Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird + Spawns a sacrificial Process as target process + (ACG+Bloc…

    C 453 69

  2. SharpGmailC2 SharpGmailC2 Public

    Our Friendly Gmail will act as Server and implant will exfiltrate data via smtp and will read commands from C2 (Gmail) via imap protocol

    C# 251 43

  3. reveng_rtkit reveng_rtkit Public

    Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypass infamous rkhunter antirootkit.

    C 206 44

  4. ReflectiveNtdll ReflectiveNtdll Public

    A Dropper POC with a focus on aiding in EDR evasion, NTDLL Unhooking followed by loading ntdll in-memory, which is present as shellcode (using pe2shc by @hasherezade). Payload encryption via System…

    C 160 22

  5. AMSI-patches-learned-till-now AMSI-patches-learned-till-now Public

    I have documented all of the AMSI patches that I learned till now

    C++ 64 9

  6. Learning-EDR-and-EDR_Evasion Learning-EDR-and-EDR_Evasion Public

    I will be uploading all the codes which I created with the help either opensource projects or blogs. This is a step by step EDR learning path for me.

    C++ 152 19