Offensive security professional with 4+ years in red team operations, EDR/AV evasion, and Active Directory exploitation. I build tools, break defenses, and document attack techniques that others don't talk about.
I'm Suleman Rehman, a cybersecurity professional with a Bachelor's degree in Cybersecurity and 4+ years of hands-on experience in offensive security operations. I hold both OSCP (Offensive Security Certified Professional) and CPTS (Certified Penetration Testing Specialist) certifications.
My expertise centers on red team engagements, EDR and AV bypass development, Active Directory attack chains, and Windows internals. I build custom offensive tools — including Chimera, a C++17 EDR evasion framework implementing 12 MITRE ATT&CK techniques — and publish research on attack techniques that aren't documented anywhere else. Beyond offensive security, I'm the founder of Veriframe — an AI-powered GRC and compliance SaaS that automates security assessments, generates audit-ready reports across 8 frameworks (SOC 2, ISO 27001, PCI DSS, HIPAA, GDPR, NIST 800-53, QCF, and ECC-2:2024), and provides continuous cloud infrastructure monitoring with Drata-equivalent evidence collection across AWS, GCP, and Azure. Currently expanding into cloud penetration testing — bridging the gap between offensive tradecraft and the cloud-native attack surface.
When I'm not on an engagement, I'm writing about persistence vectors, reversing security products, and studying the latest Windows internals to find new attack surfaces.
Deep expertise across the full offensive security stack — from Windows internals to cloud attack surfaces.
Open-source tools and research published for the security community.
Windows 11 EDR/AV evasion framework implementing 12 MITRE ATT&CK techniques under a single CLI. Covers AMSI bypass, ETW patching, direct/indirect syscalls, NTDLL unhooking, process hollowing, module stomping, sleep obfuscation, call stack spoofing, and more.
Comprehensive Azure Active Directory / Entra ID security assessment tool. Audits service principals, conditional access policies, OAuth2 app permissions, privileged identities, and misconfigurations across the full Azure AD attack surface.
Proof-of-concept C2 framework using GitHub Gist as a covert communication channel. Implant polls a Gist for commands, executes them, and writes output back — all traffic blends with normal GitHub API calls. Low-cost, high-stealth infrastructure.
Attack techniques, tool breakdowns, and research nobody else is writing about.
Shadow Credentials, AdminSDHolder backdoors, Time Provider DLLs, AMSI Provider registration — a deep dive into the persistence vectors that fly under every defender's radar, with full implementation commands.
How I built a 12-technique EDR bypass toolkit in C++17 and MASM. Covers AMSI, ETW, NTDLL unhooking, direct/indirect syscalls, process hollowing, and module stomping with full implementation details.
Living-off-the-cloud C2 infrastructure using GitHub Gist as a covert channel. Architecture, implementation, OPSEC considerations, and detection signals defenders should look for.
Full breakdown of the Azure AD / Entra ID attack surface — service principal abuse, OAuth2 token theft, conditional access bypass, privilege escalation paths, and how to audit for all of it.
Mapped to MITRE ATT&CK Enterprise framework.
Open to red team consulting, research collaborations, and security discussions.
Find me on LinkedIn or explore my tools on GitHub.