Red Team Operator & Python toolsmith. I build social tooling, C2 server, and automation recon that doesn’t wake you up at 03:00 AM.
- C2 server & operator tools: tasking, op logs, opsec guardrails, repeatable flows.
- Loaders & implants: staged/stageless, selective telemetry, quiet comms.
- Tradecraft automation: recon → initial access → privilege → persistence → exfil.
- Research: EDR/telemetry evasion, behavioral shaping, sandbox dodging.
- droper
- port scaner
- social tools
redteam tools
.social tools
.recon tools
.adversary emulation
· OPSEC-first engineering
· EDR bypass R&D
· Windows internals
· network tradecraft
· operator ergonomics
- Hardening a Python C2 core (transport abstractions + opsec checks).
Only for authorized engagements and research. If you’re not the owner or don’t have written permission, don’t touch it.
Pin your top projects so they surface here.
- 🔴 cortex-c2 — operator-first Python C2 with transport plugins.
- 🧬 cortex-win_sys_mgmt Unified Windows System‑Management Framework.
- evilginx-websocket-proxy evilginx + websocket reverse proxy