Available for Offensive Tool Development

Custom Malware | EDR Evasion | Red Team Payloads

Mitesh Dhami

Offensive Security Researcher

Specializing in emulating sophisticated adversary tradecraft to build advanced defensive capabilities. Ethical research focused on rootkits, bootkits, and kernel-level exploitation for defensive innovation.

Low-Level Systems
Malware Development
Reverse Engineering
EDR/XDR Evasion
Mitesh Dhami

Education & Background

Education & Credentials

Bachelor of Engineering in Electronics and Communication Engineering

Specialization in Digital Systems, Embedded Security, and Network Protocols. Applied low-level systems knowledge and protocol analysis to deconstruct modern cyber threats, enabling a unique perspective on attack surface and security design.

Research Focus

Proactive security researcher specializing in offensive techniques for defensive advancement. I emulate Advanced Persistent Threat (APT) group tradecraft—modeling techniques from actors like Lazarus, FIN7, APT28/Fancy Bear, and APT29/Cozy Bear—by developing proof-of-concept malware, including rootkits, bootkits, and kernel-level exploits, within isolated research environments.

This work focuses on deconstructing novel attack vectors and developing evasion methodologies (e.g., AV/EDR/XDR bypass, living-off-the-land) to pioneer innovative detection mechanisms, hardening strategies, and forensic tools.

Core Expertise

APT Tradecraft Emulation & Malware Development

Engineer controlled, proof-of-concept malware that mirrors real-world APT tools for authorized research and defensive development. Specialize in kernel/boot-level threats and evasion research against modern security stacks.

Reverse Engineering & Binary Analysis

Deconstruct malicious binaries and proprietary software to uncover vulnerabilities, hidden functionality, and C2 mechanisms. Transform analysis into actionable threat intelligence and detection logic.

Security Tooling & Detection Engineering

Design and build custom tools, automation frameworks, and research infrastructure to enhance detection capabilities, accelerate forensic analysis, and support red/blue team operations.

Skills & Technologies

Technical Skills

APT Tradecraft Emulation Reverse Engineering Windows Kernel Exploitation Malware Analysis Rootkit/Bootkit Development Ethical Hacking Kernel/Driver Development EDR/XDR Evasion Windows Internals Red Teaming Threat Intelligence Digital Forensics Penetration Testing

Tools & Languages

C/C++ Python x86/ARM Assembly PowerShell IDA Pro Ghidra WinDbg/x64dbg C# Wireshark Active Directory Linux/Windows Server Burp Suite Metasploit