C:\Users\Offensive-Panda>whoami
Usman Sikander (a.k.a Offensive-Panda) is a seasoned security professional passionate to identifying and researching advanced evasion techniques, to develop a comprehensive understanding of threat tactics, techniques, and procedures (TTPs) through in-depth analysis of real-world attack scenarios, prominent Advanced Persistent Threat (APT) campaigns, and emerging evasion tactics for validating security postures through emulations. With a proven track record in developing exploits aligned with MITRE ATT&CK tactics and automating exploit processes, I excel in conducting comprehensive simulations within controlled environments that include all security controls. My primary objective is to identify the weaknesses, mis-configuration, vulnerabilities, validate the security controls, incident response capabilities and identify areas for improvement, deliver detailed threat analysis for proactive threat hunting, providing adversary attack paths, indicators of attack (IOAs), indicators of compromise (IOCs), and actionable mitigation strategies to strengthen and enhance an organisation's detection engineering capabilities.
Purpose
Malware Technical Analysis
- Dive deep into the anatomy of malware specimens.
- Detailed reports break down the structure, behavior, and attack vectors of different malware types.
- Shedding light on their inner workings.
Attacker TTP Extraction
- Learn techniques to uncover the Tactics, Techniques, and Procedures (TTPs) used by threat actors.
- Understand their methodologies to improve threat intelligence.
Community Contributions
- Encouragement for contributions from the cybersecurity community.
- Share your insights, analysis reports, or new YARA rules.
- Bolster the repository's knowledge base.
Opensource And Commercial Tools
Check Out My Articles
Dark Crystel RAT (DCrat) Detailed Analysis
An in-depth analysis of DCrat, the remote access trojan - a critical threat to organizations worldwide. 🌐🔒. Discover the multifaceted capabilities of DCrat, including remote control, keylogging, file manipulation, and data exfiltration.
Read MoreUnveiling the Intricacies of AsyncRAT
Technical analysis of the reemerged Blind Eagle threat group (𝐀𝐏𝐓-𝐂-36), known for its targeted phishing campaigns. 🛡️ In their latest tactic, they're masquerading as a Colombian government agency, aiming their cyberattacks at organizations within 𝐂𝐨𝐥𝐨𝐦𝐛𝐢𝐚 and Ecuador.
Read MoreUnveiling the Intricacies of SamSam Ransomware
Detailed analysis and proactive threat emulation approach. I analyzed Samsam Ransomware sample which is exploiting windows systems. APT group was using multiple techniques to get initial access and executing malware on victim computer. For this variant, the initial access was done by using RDP Brute Force.
Read MoreAnalysis Repo
Malware Analysis GitHub Repo
This repository is dedicated to providing in-depth technical analysis of various malware strains, equipping security professionals, researchers, and enthusiasts with the knowledge and tools needed o counteract cyber threats effectively..
Visit RepoWriteups For Cyber Community
References
Disclaimer
The content, techniques, and tools provided in this repository are intended solely for educational and research purposes within the cybersecurity community. I explicitly disclaim any responsibility for the misuse or unlawful use of the provided materials. Any actions taken based on the information are done so at the user's own risk.