Skip to content
View NomanNasirMinhas's full-sized avatar
🏠
Working from home
🏠
Working from home

Highlights

  • Pro

Block or report NomanNasirMinhas

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
NomanNasirMinhas/README.md

MALICIOUS.DLL

🌌 Noman Nasir Minhas

🕵️‍♂️ Malware Researcher | Exploit Developer | Red/Purple Ops

Cyberpunk Theme
TryHackMe
Profile Views Twitter Cytomate


⚡ About Me (TL;DR)

  • 🧪 Malware Internals & Threat Hunting: Specializing in Windows internals, EDR evasion, and reverse engineering @ Cytomate
  • 🧵 Tech Stack: Rust, Go, C/C++, x86/x64 Assembly, PowerShell, Bash
  • 🛠️ Focus Areas: Exploit dev, AD pentesting, shellcode encryption, offline vuln scanning
  • 🛰️ Learning Lane: Post-Quantum Cryptography, Quantum Computing, Network Forensics
  • 🤝 Collab Goals: Offensive/defensive open-source tools (ethical, lawful research)
  • 🧰 Day Job: Reverse → Break → Detect → Repeat

Note: All experiments conducted in controlled lab environments for R&D and defense.


🧾 Cyber Card

user@lab:~$ whoami && hostname && date
noman psiberus-lab $(now)
OS: Win11/Kali/Arch | Editor: nvim + VSCode + CLion
Stacks: Rust • Go • C/C++ • Python • TS • Assembly
Targets: Win32/64, AD, browsers, Office, network toys
Lab: VMware/Hyper-V • AD forest • ELK • MDE • Sysmon • Zeek

📦 Operations / What I'm Building

  • Psiberus: Rust + Go + Tauri adversary-sim suite. Agent, operator UI, MQTT/RabbitMQ backend, ELK/MDE/Sysmon telemetry
  • Shifa SSO Platform: Hospital-grade SSO for Oracle Forms 11g/12c with AD/Kerberos auth, custom token handoff, JCI/ISO 27001 compliance
  • Rust Metrics → WS Gateway: System metrics (CPU, disk, thermals) streamed to Tauri UI via WebSocket
  • Go Microservices: Gin APIs, MQTT listeners, Oracle/MariaDB clients, C2-lite task runners, Windows service lifecycle
  • Offline Vuln Scans: OpenSCAP, Lynis, CVE Binary Tool scripts for air-gapped Linux/macOS/Windows, mapping to CVEs
  • FastAPI CVE Manager: JWT-auth app for generating/downloading CVE check scripts, optimized for Google Cloud
  • Shellcode Encryption: Go-based AES-256-CTR encryption/decryption with hexdump output for loaders
  • AD Pentesting Suite: Credential dumping, password spraying, and privilege escalation using Mimikatz, CrackMapExec, Impacket
  • Windows Service Monitor: Go program for OCT folder monitoring and secure uploads, running as a Windows service

Repo hub: github.com/NomanNasirMinhas


🧭 Research Focus

  • Windows Internals & Evasion: DLL unhooking, ETW/AMSI patching, section-remap loaders, thread hijack/APC, token/handle manipulation
  • Auth/AD Tradecraft: NTLMv1/v2 capture (Inveigh/Responder), Hashcat cracking, BloodHound pathing, Impacket ops
  • Network Forensics: Zeek/Suricata signals, PCAP triage, WPAD/Proxy research, TLS fingerprinting
  • Crypto/PQC: Kyber/Dilithium studies, secure channel design, key management

🤖 Hacker's Arsenal

  • Languages: C, C++, Rust, Python, Go, Assembly, PowerShell, Bash
  • Cyber Skills: Exploit Development, Reverse Engineering, Network Pentesting, Web3 Security, AD Attacks, Vulnerability Scanning
  • Software Skills: FastAPI, Dockerized Deployments, Offline Auditing, Shellcode Encryption
  • Tools: IDA Pro, Ghidra, Wireshark, Metasploit, Burp Suite, Volatility, Nmap, OpenSCAP, Lynis, CVE Binary Tool, Mimikatz, CrackMapExec, Impacket, sqlmap, BloodHound, Sysmon, Zeek

🏥 Healthcare & Compliance

  • Workflows: Chat, video, schedules, lab results with privacy-by-design
  • Standards: JCI, ISO/IEC 27001:2022 (RBAC, audit trails, least privilege)

✍️ Posts & Talks

  • Medium @malicious-dll
  • Topics: Loader design, ETW/AMSI research, token/handle internals, memory forensics, AD attack/defense

🧪 Labs & Badges

TryHackMe
HTB Credly

📊 Hack Stats

GitHub Stats Top Languages Streak Stats


📡 Connect to the Matrix

Twitter LinkedIn Medium


🔐 Contact / Keys


"Break the system, secure the future."
🦂 Malware Slayer | Code Alchemist | Red Team Operative

⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢠⠶⠶⠤⣄⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢸⣆⡀⠀⠈⠳⣄⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠈⠻⢿⣶⣤⣤⣽⣆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠈⢿⡿⠛⠁⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⢀⣠⠤⠤⠤⠤⠤⢤⣤⣀⠀⠀⣸⣇⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⣴⠋⠀⠀⠀⠀⠀⠀⠀⠀⠀⠈⠻⣾⣿⣧⣀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⢸⣿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠙⠻⢿⣿⣶⣤⣀⡀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠸⣿⣦⣀⠀⢀⣠⠤⠤⠤⠤⣀⠀⠀⠀⠀⠀⠈⠉⠉⠙⠛⠓⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠈⠻⠿⡿⠛⠁⠀⠀⠀⠀⠀⠉⠓⠂⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⢶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⡶
⠀⠘⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠃
⠀⠀⠈⠻⢿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠟⠁⠀
⠀⠀⠀⠀⠀⠀⠉⠙⠛⠛⠛⠛⠛⠛⠛⠛⠛⠛⠛⠛⠛⠛⠛⠛⠛⠛⠛⠛⠛⠉⠀⠀⠀

Popular repositories Loading

  1. Offensive-Rust Offensive-Rust Public

    Rust 4

  2. OpinionByNoman OpinionByNoman Public

    HTML 1

  3. Health-Monitoring-with-Theta-Middleware Health-Monitoring-with-Theta-Middleware Public

    JavaScript 1

  4. datascience_project1 datascience_project1 Public

    This repository uses World Development Index dataset to analyze different Indicators of Pakistan

    Jupyter Notebook 1

  5. Disaster_Response_Pipeline Disaster_Response_Pipeline Public

    We have a data set containing real messages that were sent during disaster events. We will create a machine learning pipeline to categorize these events so that we can send the messages to an appro…

    Python 1

  6. Starbucks-Capstone-Project Starbucks-Capstone-Project Public

    In this project we will use data provided by Starbucks to analyze how customers have behaved over the years to different offers and other such details.

    Jupyter Notebook 1 1