NT-AUTH-NewPrompt
Windows capability leveraging NT AUTHORITY mechanisms to spawn an elevated prompt. Demonstrates advanced Win32 API usage including token manipulation and privilege escalation techniques at the user-level.
View on GitHub
Senior Cyberspace Capability Developer and OSCP+ certified offensive security engineer. Focus on Windows internals, Win32 API exploitation, and advanced capability development for offensive cyber operations.
Senior cyberspace capability developer with experience spanning offensive and defensive cyber operations, with a specialization in persistence mechanisms through the Win32 API. Leads the agile development process for a crew of four Cyberspace Capability Developers, managing stakeholder expectations end-to-end.
Proven track record developing advanced system-specific capabilities that enable offensive cyber operations, leading battalion-level Defensive Cyber Operations planning, and conducting enterprise network assessments that measurably improve security posture.
780th Military Intelligence Brigade · Fort Eisenhower, GA
U.S. Army Cyber Protection Brigade · Fort Eisenhower, GA
U.S. Army Cyber Protection Brigade · Fort Eisenhower, GA
U.S. Army Cyber Protection Brigade · Fort Eisenhower, GA
U.S. Army Cyber Training Battalion · Fort Eisenhower, GA
A selection of open-source work I've built or contributed to recently — tools and proof-of-concepts that reflect my focus on Windows internals and offensive capability development.
Windows capability leveraging NT AUTHORITY mechanisms to spawn an elevated prompt. Demonstrates advanced Win32 API usage including token manipulation and privilege escalation techniques at the user-level.
View on GitHub
Proof-of-concept demonstrating abuse of SeRestorePrivilege in Windows
environments. Enables targeted file system manipulation for privilege escalation
scenarios, implemented in C against the Win32 API.
Contributions to NetExec (nxc), extending the open-source network exploitation framework with an additional module for SeRestoreAbuse that streamlines penetration testing and threat emulation workflows. [PENDING]
View on GitHubGeorgia Institute of Technology · Atlanta, GA
White Knight Labs
Refactoring and extending an RPC client-server architecture to enable red team command-and-control capabilities.
University of South Florida
Helped develop a catalyst for syngas reformation for use in a $2M pilot plant.
Resolute Forest Products
Enabled conversion of main paper machine to alkali process; chemical dosage calculations yielded approximately $5M in annual savings.
Oak Ridge National Laboratory
Developed a technique improving accuracy in mass spectrometry data evaluation, saving approximately 10% of analysis time for researchers worldwide.
Open to discussing roles in offensive security, capability development, or red team engineering.