Hello I'm

Vasan Dilaksan

Offensive Security Researcher

I specialize in offensive security, focusing on exploit development and automation. Proficient in C programming, I develop custom security tools, including BlackHatOps, a stealthy Windows backdoor. My goal is to automate red team operations across multiple platforms, streamlining vulnerability exploitation and privilege escalation. With a deep passion for solving complex cybersecurity challenges

MyPhoto

Profile

Experiance

Skills

Education

2023 - Present

Offensive Security Researcher

BlackHatOps

As an Offensive Security Researcher, I developed the BlackHatOps project, a C-based backdoor for Windows that enables stealth shell access and automates offensive tasks like keylogging, persistence, and remote process injection. This project required knowledge in exploit development, security evasion, and reverse engineering, refining my expertise in Windows internals and C programming for real-world red team operations.

2023 - Present

Sales Officer

Global Textile

As a Sales Officer at Global Textile LLC, I focused on order management, coordinating between clients and production teams to ensure timely deliveries and accurate order fulfillment. My role included tracking inventory, processing orders, and handling client inquiries, which streamlined operations and enhanced customer satisfaction.

2023 - Present

Self Studying Programmer

BlackHatOps

As a self-taught C Programmer, I developed projects focused on system-level programming, including memory management, data structures, and file I/O. I worked on tasks like debugging, optimizing code for efficiency, and handling low-level operations, which deepened my understanding of C and core programming concepts.

2022 - 2023

C# Programmer

Ceylon Innovations PVT LTD

As a C# Programming Intern, I assisted in developing .NET applications, focusing on backend logic, debugging, and API integration. I gained hands-on experience with Visual Studio, Git, and database connectivity, improving my skills in object-oriented programming and collaborative development.

C

C++

C#

Python

PHP

MySQL

Debugging

Offensive Coding

Penetration Testing

Networking

GIT

Kubernetes

Dockerization

Linux

CSS

HTML

2024 - Present

CS50x

Online Course - Harvard University

Currently pursing the CS50 from Harvard University, mastering fundamental concepts in computer science and programming. This course covered algorithms, data structures, memory management, web development, and more, providing hands-on experience with languages such as C, Python, and JavaScript. Through rigorous problem-solving and project-based learning, I developed skills in efficient coding, debugging, and complex problem-solving, building a robust foundation for software development and computer science applications.

2024 - Present

Higher National Diploma in Information Technology

Onsite Course - Donbosco Technical Collage

Pursing the Higher National Diploma in Information Technology, gaining comprehensive expertise in core IT areas including software development, networking, database management, and information systems. This diploma emphasized hands-on skills in programming, system design, and IT project management, providing a strong foundation to manage and optimize digital environments. This qualification prepares me to tackle complex tech challenges and contribute effectively in various IT roles.

2024

Python Programming Course

Online Course - Moratuwa University

Completed the Python Programming Course from Moratuwa University, gaining proficiency in core Python concepts such as data types, control structures, functions, and object-oriented programming. This course emphasized practical skills in developing efficient, reusable code for various applications, including data analysis and web development. This certification has equipped me with versatile coding techniques to solve complex problems effectively.

2023

Diploma In Ethical Hacking Course

Online Course - From Alison

Completed the Diploma in Ethical Hacking course, gaining a solid foundation in network security, malware defense, and penetration testing methodologies. This certification covered essential cybersecurity practices to protect data from evolving threats like malware and ransomware. Additionally, it emphasizes ethical and legal standards in cybersecurity, preparing me to perform professional-level security assessments and digital protection techniques.

2022

Professional Ethical Hacking Course

Online Course - From Alison

Successfully completed the Ethical Hacking and Information Security course from Alison, where I gained hands-on expertise in key areas of cybersecurity. This certification covered cryptography fundamentals, hash functions, digital signatures, and essential protocols such as TLS and IPsec. Additionally, I mastered practical applications of biometrics and steganography, learning robust data security and network protection techniques that enhance confidentiality and data integrity. This course has equipped me with the knowledge to address modern cybersecurity challenges effectively and apply ethical hacking practices to protect digital assets.

2022

Introduction to IT & Cybersecurity course

Online Course - From Cybrary

Upon completing the Cybrary Introduction to IT & Cybersecurity course, I gained a solid foundational understanding of key IT concepts and the principles of cybersecurity. I learned to identify various types of cybersecurity threats and vulnerabilities, grasped the importance of security policies, and acquired the skills to implement basic protective measures. Additionally, I became familiar with essential tools and techniques used in the industry, which has prepared me for further studies in IT and cybersecurity careers. Overall, this course equipped me with the knowledge and skills necessary to navigate the evolving digital landscape securely.

2021

Kali Linux Fundamentals Course

Online Course - From Cybrary

Cybrary's Kali Linux Fundamentals course equips with essential skills in using Kali Linux for ethical hacking. Upon completion, I can be able to install and navigate Kali, use command-line tools, perform basic penetration testing, and conduct security assessments. This course provides a foundation in offensive security, preparing learners for more advanced cybersecurity tasks

Porfolio

My Certifications

My Projects

Work

Diploma in Ethical Hacking

From Alison

Work

Introduction to IT and Cybersecurity.

From Cybrary

Work

OWASP TOP 10

From Cybrary

Work

Kali Linux Fundamentals

From Cybrary

Work

Andriod Bug Bounty.

From EC-Council

Work

Intership in Ethical Hacking

From CyberDosti

Work

Network Security

From Great Learning Academy

Work

Professional Ethical Hacking

From Alison

Work

Python Programming

From Moratuwa University

Work

Information Security Associate

From SkillFront

Work

Ethical Hacking Intership

From H1k0r

Basic Socket Implemention.

A Basic Socket Implementation in C involves creating a connection between a client and server over a network. This program uses C’s socket API to establish a communication channel, where the server listens on a specified port, and the client connects to send or receive data. Key steps include socket creation, binding, listening (on the server side), and connecting (on the client side). This foundational approach enables data exchange across devices, forming the basis for networked applications.

C - Reverse Shell

A Basic Windows Reverse Shell in C is a program that connects a target Windows machine back to an attacker-controlled server, granting remote access to a command shell. In this implementation, the program uses socket programming to establish a reverse connection, allowing the attacker to send commands and receive output from the target. Typically, enabling covert access and control of the system’s command-line interface.

C - Shellcode Execution Program

C Shellcode Execution Program is designed to run specific shellcode within a target system. In my program, it executes shellcode that opens Notepad, but the same approach can be adapted for other actions depending on the payload. This program typically involves injecting shellcode directly into memory and triggering its execution, allowing control over processes in the target environment. While it can perform benign actions like launching applications, the technique can also be leveraged for offensive tasks if altered, underscoring the importance of secure handling in development and ethical use in testing environments.

Remote Process Injection - Shellcode

This project explores Remote Process Injection (RPI) using C to execute shellcode that creates a reverse shell within a targeted process. By injecting code into legitimate applications, it establishes a remote command interface, demonstrating both potential security vulnerabilities and ethical hacking techniques. This project serves as a valuable resource for cybersecurity professionals interested in penetration testing and understanding system exploits.

Main Project - BlackHatOps

This project, developed under BlackHatOps, focuses on creating a malware backdoor using C for offensive operations on Windows systems. The program implements a persistent connection to a remote server via socket programming, enabling stealthy control over the target machine. Key features include a stealth shell function for covert access, automatic startup upon system reboot through the Windows Registry Editor, and process administration capabilities for starting and stopping applications and services. Additionally, the backdoor allows for directory traversal and incorporates a keylogger to record keystrokes. While the program demonstrates potential offensive capabilities, its ethical use is contingent upon intent and legal compliance.

Contact

Let's Work Together.

VasanDilaksan
[0x7]
170931
3 days
6
35
tryhackme.com