cryptoplague blog
Support Ukrainetishina.intenendo.com
  • 🏑Home
    • ℹ️About me
  • βš”οΈWar in Ukraine
    • πŸ‡ΊπŸ‡¦Support Ukraine
  • πŸ”¬Research
    • πŸͺŸWindows Research
      • The dusk of g_CiOptions: circumventing DSE with VBS enabled
      • ProxyAlloc: evading NtAllocateVirtualMemory detection ft. Elastic Defend & Binary Ninja
      • Offset-free DSE bypass across Windows 11 & 10: utilising ntkrnlmp.pdb
    • 🍏macOS Research
      • Reverse Engineering and Demystifying *OS Private Frameworks
      • Objective-C .dylib Reverse Engineering "gigavaxxed" with Binary Ninja & LLDB
Powered by GitBook
On this page
  • About
  • πŸ‡ΊπŸ‡¦ Support Ukraine πŸ‡ΊπŸ‡¦
  • Socials
  • Research
  • Certifications
  • Trainings
  • Friends
  1. Home

About me

NextWindows Research

Last updated 2 months ago

About

I'm Daniil Nababkin, a Ukrainian Offensive Security Specialist currently employed at . For most of my working time, I perform Penetration Testing & Adversary Simulation / Red Team engagements for external clients.

My personal interests include:

  • Red Teaming & Adversary Simulation

  • Offensive Tooling Development

  • Reverse Engineering

  • Security Research

  • macOS / Windows Internals

  • IoT

πŸ‡ΊπŸ‡¦ Support Ukraine πŸ‡ΊπŸ‡¦

Socials

Research

Certifications

Trainings

  • 2022 | Program Analysis for Vulnerability Research @ Margin Research, Vector35

  • 2022 | Certified Hybrid Multi-Cloud Red Team Specialist (CHMRTS) @ Cyberwarfare Labs

  • 2023 | StealthOps: Red Team Trade-craft Targeting Enterprise Security Controls @ Cyberwarfare Labs

  • 2023 | Certified Google Cloud Red Team Specialist (CGRTS) @ Cyberwarfare Labs

Friends

| | | | | |

| | |

| |

| |

|

- Red Team Tradecraft Blog by

🏑
ℹ️
Tenendo
You can save lives, no matter where in the world you are.
GitHub
Twitter
LinkedIn
ProxyAlloc: evading NtAllocateVirtualMemory detection ft. Elastic Defend & Binary Ninja
Offset-free DSE bypass across Windows 11 & 10: utilising ntkrnlmp.pdb
The dusk of g_CiOptions: circumventing DSE with VBS enabled
Objective-C .dylib Reverse Engineering "gigavaxxed" with Binary Ninja & LLDB
Reverse Engineering and Demystifying *OS Private Frameworks
OSCE3
OSMR
OSCP
OSED
OSEP
OSWE
OSWP
eWPTXv2
SEKTOR7 MDA 1
SEKTOR7 MDA 2
SEKTOR7 MDI
SEKTOR7 WE
HtB BlackSky: Hailstorm (AWS)
HtB BlackSky: Cyclone (Azure)
HtB BlackSky: Blizzard (GCP)
CHMRTS
CARTS
CGRTS
HtB APTLabs (Red Team Operator Level III)
HtB Cybernetics (Red Team Operator Level II)
HtB RastaLabs (Red Team Operator Level I)
HtB Offshore (Penetration Tester Level III)
CRTL
CRTO
CRTS
Evilginx Mastery
VHL Advanced+
VHL
Cisco Cybersecurity Essentials
II place at the National Hackathon on Cyber Security of Ukraine (OSINT)
tishina.in
@zimnyaatishina