I specialize in offensive security, focusing on exploit development and automation. Proficient in C programming, I develop custom security tools, including BlackHatOps, a stealthy Windows backdoor. My goal is to automate red team operations across multiple platforms, streamlining vulnerability exploitation and privilege escalation. With a deep passion for solving complex cybersecurity challenges
As an Offensive Security Researcher, I developed the BlackHatOps project, a C-based backdoor for Windows that enables stealth shell access and automates offensive tasks like keylogging, persistence, and remote process injection. This project required knowledge in exploit development, security evasion, and reverse engineering, refining my expertise in Windows internals and C programming for real-world red team operations.
As a Sales Officer at Global Textile LLC, I focused on order management, coordinating between clients and production teams to ensure timely deliveries and accurate order fulfillment. My role included tracking inventory, processing orders, and handling client inquiries, which streamlined operations and enhanced customer satisfaction.
As a self-taught C Programmer, I developed projects focused on system-level programming, including memory management, data structures, and file I/O. I worked on tasks like debugging, optimizing code for efficiency, and handling low-level operations, which deepened my understanding of C and core programming concepts.
As a C# Programming Intern, I assisted in developing .NET applications, focusing on backend logic, debugging, and API integration. I gained hands-on experience with Visual Studio, Git, and database connectivity, improving my skills in object-oriented programming and collaborative development.
C
C++
C#
Python
PHP
MySQL
Debugging
Offensive Coding
Penetration Testing
Networking
GIT
Kubernetes
Dockerization
Linux
CSS
HTML
Currently pursing the CS50 from Harvard University, mastering fundamental concepts in computer science and programming. This course covered algorithms, data structures, memory management, web development, and more, providing hands-on experience with languages such as C, Python, and JavaScript. Through rigorous problem-solving and project-based learning, I developed skills in efficient coding, debugging, and complex problem-solving, building a robust foundation for software development and computer science applications.
Pursing the Higher National Diploma in Information Technology, gaining comprehensive expertise in core IT areas including software development, networking, database management, and information systems. This diploma emphasized hands-on skills in programming, system design, and IT project management, providing a strong foundation to manage and optimize digital environments. This qualification prepares me to tackle complex tech challenges and contribute effectively in various IT roles.
Completed the Python Programming Course from Moratuwa University, gaining proficiency in core Python concepts such as data types, control structures, functions, and object-oriented programming. This course emphasized practical skills in developing efficient, reusable code for various applications, including data analysis and web development. This certification has equipped me with versatile coding techniques to solve complex problems effectively.
Completed the Diploma in Ethical Hacking course, gaining a solid foundation in network security, malware defense, and penetration testing methodologies. This certification covered essential cybersecurity practices to protect data from evolving threats like malware and ransomware. Additionally, it emphasizes ethical and legal standards in cybersecurity, preparing me to perform professional-level security assessments and digital protection techniques.
Successfully completed the Ethical Hacking and Information Security course from Alison, where I gained hands-on expertise in key areas of cybersecurity. This certification covered cryptography fundamentals, hash functions, digital signatures, and essential protocols such as TLS and IPsec. Additionally, I mastered practical applications of biometrics and steganography, learning robust data security and network protection techniques that enhance confidentiality and data integrity. This course has equipped me with the knowledge to address modern cybersecurity challenges effectively and apply ethical hacking practices to protect digital assets.
Upon completing the Cybrary Introduction to IT & Cybersecurity course, I gained a solid foundational understanding of key IT concepts and the principles of cybersecurity. I learned to identify various types of cybersecurity threats and vulnerabilities, grasped the importance of security policies, and acquired the skills to implement basic protective measures. Additionally, I became familiar with essential tools and techniques used in the industry, which has prepared me for further studies in IT and cybersecurity careers. Overall, this course equipped me with the knowledge and skills necessary to navigate the evolving digital landscape securely.
Cybrary's Kali Linux Fundamentals course equips with essential skills in using Kali Linux for ethical hacking. Upon completion, I can be able to install and navigate Kali, use command-line tools, perform basic penetration testing, and conduct security assessments. This course provides a foundation in offensive security, preparing learners for more advanced cybersecurity tasks
From Alison
From Cybrary
From Cybrary
From Cybrary
From EC-Council
From CyberDosti
From Great Learning Academy
From Alison
From Moratuwa University
From SkillFront
From H1k0r
A Basic Socket Implementation in C involves creating a connection between a client and server over a network. This program uses C’s socket API to establish a communication channel, where the server listens on a specified port, and the client connects to send or receive data. Key steps include socket creation, binding, listening (on the server side), and connecting (on the client side). This foundational approach enables data exchange across devices, forming the basis for networked applications.
A Basic Windows Reverse Shell in C is a program that connects a target Windows machine back to an attacker-controlled server, granting remote access to a command shell. In this implementation, the program uses socket programming to establish a reverse connection, allowing the attacker to send commands and receive output from the target. Typically, enabling covert access and control of the system’s command-line interface.
C Shellcode Execution Program is designed to run specific shellcode within a target system. In my program, it executes shellcode that opens Notepad, but the same approach can be adapted for other actions depending on the payload. This program typically involves injecting shellcode directly into memory and triggering its execution, allowing control over processes in the target environment. While it can perform benign actions like launching applications, the technique can also be leveraged for offensive tasks if altered, underscoring the importance of secure handling in development and ethical use in testing environments.
This project explores Remote Process Injection (RPI) using C to execute shellcode that creates a reverse shell within a targeted process. By injecting code into legitimate applications, it establishes a remote command interface, demonstrating both potential security vulnerabilities and ethical hacking techniques. This project serves as a valuable resource for cybersecurity professionals interested in penetration testing and understanding system exploits.
This project, developed under BlackHatOps, focuses on creating a malware backdoor using C for offensive operations on Windows systems. The program implements a persistent connection to a remote server via socket programming, enabling stealthy control over the target machine. Key features include a stealth shell function for covert access, automatic startup upon system reboot through the Windows Registry Editor, and process administration capabilities for starting and stopping applications and services. Additionally, the backdoor allows for directory traversal and incorporates a keylogger to record keystrokes. While the program demonstrates potential offensive capabilities, its ethical use is contingent upon intent and legal compliance.