طرح های تحقیقاتی و پژوهشی
- The art of hiding in Windows - https://hadess.io/the-art-of-hiding-in-windows/ (1402)
- EDR evasion using syscalls - https://hadess.io/edr-evasion-techniques-using-syscalls/ (1402)
- Windows persistence - https://hadess.io/the-art-of-windows-persistence/ (1402)
- Linux persistence - https://hadess.io/the-art-of-linux-persistence/ (1402)
- Pwning the Domain: Credentialess/Username - https://hadess.io/pwning-the-domain-credentialess-username/ (1402)
- Thick client domination - https://arimaqz.github.io (1402)
- PEB for malware development - https://arimaqz.github.io (1402)
- Stealing Windows NTLM with SQLi - https://arimaqz.github.io (1401)
- Opiuchi(HackTheBox) Writeup - https://arimaqz.github.io (1400)
سوابق شغلی و تخصصی
- کارشناس تست نفوذ - آشنا ایمن (1401-1402)
- محقق امنیت - حادث (1402-تاکنون)
سوابق حضور در دوره ها و کارگاههای تخصصی
- Red Team - Nooranet (1402)
- Windows Malware Development - Nooranet (1402)