MAR 2026
Building a Custom C2 Framework from Scratch
Full-featured C2 in C — Tartarus Gate syscalls, sleep obfuscation, anti-correlation evasion, cascading injection, and HTTPS redirector infrastructure.
Offensive security researcher and custom tooling developer. I build C2 frameworks from scratch, engineer EDR evasion at the kernel level, and automate intelligence correlation across leaked databases at scale.
Background in law enforcement financial fraud investigations and military intelligence training. Recognized as Analyst of the Year 2025.
Source code is proprietary — this portfolio demonstrates methodology, architecture, and tradecraft.
Top 10 player in Mexico. View profile →
APTLabs
Level 3 — Red Team Ops
P.O.O.
Ascension
Odyssey
Hades
DarkCorp
WhiteRabbit
Sorcery
Hercules
Synacktiv
CRTA
Red Team Analyst
BTL1
Blue Team Level 1
arcX
Threat Intelligence Analyst
Maltego
Advanced / Cybercrime / Dark Web
INTERPOL
USSS
NTAC Program
UNOCT
CT & Crypto Investigations
CISA
Cyber Intel & Risk Mgmt
GOBERNA
Strategic Intelligence
FGR
OSINT Training
SSPC
OSINT Training
SSC
OSINT Training
Renseignements Généraux
Intelligence Training
MAR 2026
Full-featured C2 in C — Tartarus Gate syscalls, sleep obfuscation, anti-correlation evasion, cascading injection, and HTTPS redirector infrastructure.
JAN 2026
Discovering and weaponizing CVE-2026-21509 — a zero-interaction OLE ActiveX bypass in Microsoft Office that circumvents kill bit enforcement.
DEC 2025
Building an AI agent pipeline that correlates breached databases, stealer logs, and public records to construct complete intelligence profiles from minimal seed data.
Discord: wlan0._
Email: intel4good@proton.me