NomanNasirMinhas - Overview


⚡ About Me (TL;DR)

  • 🧪 Malware Internals & Threat Hunting: Specializing in Windows internals, EDR evasion, and reverse engineering @ Cytomate
  • 🧵 Tech Stack: Rust, Go, C/C++, x86/x64 Assembly, PowerShell, Bash
  • 🛠️ Focus Areas: Exploit dev, AD pentesting, shellcode encryption, offline vuln scanning
  • 🛰️ Learning Lane: Post-Quantum Cryptography, Quantum Computing, Network Forensics
  • 🤝 Collab Goals: Offensive/defensive open-source tools (ethical, lawful research)
  • 🧰 Day Job: Reverse → Break → Detect → Repeat

Note: All experiments conducted in controlled lab environments for R&D and defense.


🧾 Cyber Card

user@lab:~$ whoami && hostname && date
noman psiberus-lab $(now)
OS: Win11/Kali/Arch | Editor: nvim + VSCode + CLion
Stacks: Rust • Go • C/C++ • Python • TS • Assembly
Targets: Win32/64, AD, browsers, Office, network toys
Lab: VMware/Hyper-V • AD forest • ELK • MDE • Sysmon • Zeek

📦 Operations / What I'm Building

  • Psiberus: Rust + Go + Tauri adversary-sim suite. Agent, operator UI, MQTT/RabbitMQ backend, ELK/MDE/Sysmon telemetry
  • Shifa SSO Platform: Hospital-grade SSO for Oracle Forms 11g/12c with AD/Kerberos auth, custom token handoff, JCI/ISO 27001 compliance
  • Rust Metrics → WS Gateway: System metrics (CPU, disk, thermals) streamed to Tauri UI via WebSocket
  • Go Microservices: Gin APIs, MQTT listeners, Oracle/MariaDB clients, C2-lite task runners, Windows service lifecycle
  • Offline Vuln Scans: OpenSCAP, Lynis, CVE Binary Tool scripts for air-gapped Linux/macOS/Windows, mapping to CVEs
  • FastAPI CVE Manager: JWT-auth app for generating/downloading CVE check scripts, optimized for Google Cloud
  • Shellcode Encryption: Go-based AES-256-CTR encryption/decryption with hexdump output for loaders
  • AD Pentesting Suite: Credential dumping, password spraying, and privilege escalation using Mimikatz, CrackMapExec, Impacket
  • Windows Service Monitor: Go program for OCT folder monitoring and secure uploads, running as a Windows service

Repo hub: github.com/NomanNasirMinhas


🗂️ Recent Projects (2024–2026)

Repo Lang Description
Offensive-Rust Rust Offensive security toolkit: C2 server, local & remote shellcode injection, WinAPI MessageBox bindings
CPP-Utils C++ C++ utility library used for malware/offensive tooling development (MSVC)
Offensive-Go Go GoShark – Wails + Svelte desktop packet capture UI; NetworkMonitor passive listener
ARP-Puker Rust ARP-based MITM attacker – gratuitous ARP poisoning & packet interception
Qiskit-Basic-Of-Quantum-Information Python Qiskit Jupyter notebooks: single-qubit & multi-qubit quantum information fundamentals
Pentesting-Notes AD attack mindmap (Excalidraw), pentest cheatsheets, CherryTree structured notes
Rust-Driver-Clone Rust Windows kernel driver written in Rust (WDK) – EDR/AV internals research
binary-to-shellcode Educational: convert a full PE binary to position-independent shellcode with encryption support

🧭 Research Focus

  • Windows Internals & Evasion: DLL unhooking, ETW/AMSI patching, section-remap loaders, thread hijack/APC, token/handle manipulation
  • Auth/AD Tradecraft: NTLMv1/v2 capture (Inveigh/Responder), Hashcat cracking, BloodHound pathing, Impacket ops
  • Network Forensics: Zeek/Suricata signals, PCAP triage, WPAD/Proxy research, TLS fingerprinting
  • Crypto/PQC: Kyber/Dilithium studies, secure channel design, key management

🤖 Hacker's Arsenal

  • Languages: C, C++, Rust, Python, Go, Assembly, PowerShell, Bash
  • Cyber Skills: Exploit Development, Reverse Engineering, Network Pentesting, Web3 Security, AD Attacks, Vulnerability Scanning
  • Software Skills: FastAPI, Dockerized Deployments, Offline Auditing, Shellcode Encryption
  • Tools: IDA Pro, Ghidra, Wireshark, Metasploit, Burp Suite, Volatility, Nmap, OpenSCAP, Lynis, CVE Binary Tool, Mimikatz, CrackMapExec, Impacket, sqlmap, BloodHound, Sysmon, Zeek

🏥 Healthcare & Compliance

  • Workflows: Chat, video, schedules, lab results with privacy-by-design
  • Standards: JCI, ISO/IEC 27001:2022 (RBAC, audit trails, least privilege)

✍️ Posts & Talks

  • Medium @malicious-dll
  • Topics: Loader design, ETW/AMSI research, token/handle internals, memory forensics, AD attack/defense

🧪 Labs & Badges

TryHackMe
HTB Credly


📊 Hack Stats

GitHub Stats Top Languages Streak Stats


📡 Connect to the Matrix

Twitter LinkedIn Medium


🔐 Contact / Keys


"Break the system, secure the future."
🦂 Malware Slayer | Code Alchemist | Red Team Operative

⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢠⠶⠶⠤⣄⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢸⣆⡀⠀⠈⠳⣄⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠈⠻⢿⣶⣤⣤⣽⣆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠈⢿⡿⠛⠁⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⢀⣠⠤⠤⠤⠤⠤⢤⣤⣀⠀⠀⣸⣇⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⣴⠋⠀⠀⠀⠀⠀⠀⠀⠀⠀⠈⠻⣾⣿⣧⣀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⢸⣿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠙⠻⢿⣿⣶⣤⣀⡀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠸⣿⣦⣀⠀⢀⣠⠤⠤⠤⠤⣀⠀⠀⠀⠀⠀⠈⠉⠉⠙⠛⠓⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠈⠻⠿⡿⠛⠁⠀⠀⠀⠀⠀⠉⠓⠂⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⢶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⡶
⠀⠘⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠃
⠀⠀⠈⠻⢿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠟⠁⠀
⠀⠀⠀⠀⠀⠀⠉⠙⠛⠛⠛⠛⠛⠛⠛⠛⠛⠛⠛⠛⠛⠛⠛⠛⠛⠛⠛⠛⠛⠉⠀⠀⠀