Cybersecurity Researcher | Red Team Operator | Malware Developer
Breaking systems to understand them better.
I am a Red Team Operator and Malware Developer focused on offensive security research.
I specialize in:
- Advanced Red Team Operations
- Malware Development
- Windows Internals
- Exploit Development
- Command & Control Infrastructure
- AV / EDR Evasion Techniques
I enjoy building offensive security tools and researching new ways to bypass modern defenses.
- Red Team Infrastructure
- Command & Control Development
- Malware Research
- Exploit Development
- Windows Internals
- AV/EDR Bypass
- PNPT β Practical Network Penetration Tester
- OSCP
- OSCP +
- CRTO β Certified Red Team Operator
- Malware Development Certification
- Cisco Ethical Hacker
Currently researching and developing:
- Custom C2 frameworks
- DNS over HTTPS C2
- AV / AMSI bypass techniques
- Advanced malware loaders
- Post exploitation tooling
- Exploits
Some projects I work on include:
- π΄ Red Team Tools
- π¦ Malware Development Research
- β‘ Exploit Development
- π Offensive Security Automation
Check them here:
π https://github.com/mulwarex?tab=repositories
- π Website: https://mulwarex.github.io
- πΌ LinkedIn: https://pk.linkedin.com/in/ahmed-raza-327aaa2b3
- π» GitHub: https://github.com/mulwarex
- π¬ Discord: mulware
"Offense drives defense."



