Mitesh Dhami
Specializing in emulating sophisticated adversary tradecraft to build advanced defensive capabilities. Ethical research focused on rootkits, bootkits, and kernel-level exploitation for defensive innovation.
Education & Background
Education & Credentials
Bachelor of Engineering in Electronics and Communication Engineering
Specialization in Digital Systems, Embedded Security, and Network Protocols. Applied low-level systems knowledge and protocol analysis to deconstruct modern cyber threats, enabling a unique perspective on attack surface and security design.
Research Focus
Proactive security researcher specializing in offensive techniques for defensive advancement. I emulate Advanced Persistent Threat (APT) group tradecraft—modeling techniques from actors like Lazarus, FIN7, APT28/Fancy Bear, and APT29/Cozy Bear—by developing proof-of-concept malware, including rootkits, bootkits, and kernel-level exploits, within isolated research environments.
This work focuses on deconstructing novel attack vectors and developing evasion methodologies (e.g., AV/EDR/XDR bypass, living-off-the-land) to pioneer innovative detection mechanisms, hardening strategies, and forensic tools.
Core Expertise
APT Tradecraft Emulation & Malware Development
Engineer controlled, proof-of-concept malware that mirrors real-world APT tools for authorized research and defensive development. Specialize in kernel/boot-level threats and evasion research against modern security stacks.
Reverse Engineering & Binary Analysis
Deconstruct malicious binaries and proprietary software to uncover vulnerabilities, hidden functionality, and C2 mechanisms. Transform analysis into actionable threat intelligence and detection logic.
Security Tooling & Detection Engineering
Design and build custom tools, automation frameworks, and research infrastructure to enhance detection capabilities, accelerate forensic analysis, and support red/blue team operations.