Computer engineer focused on low-level programming, offensive security, and system internals.
This portfolio reflects hands-on work across malware development, red team tooling, operating systems, and full-stack engineering. Everything here was built to understand how systems actually work—and how they break.
-
Execute .NET assemblies fully in-memory while bypassing ETW & AMSI
→ BetterNetLoader -
Protect executable memory regions using PAGE_NOACCESS + section hiding
→ PageNoAccess-SectionHider -
Achilles Remote Administration Tool
Sysadmin-focused RAT with offensive design principles (private) -
Command & Control Framework (C# / Go)
Modular C2 architecture with custom agents and transport
→ Capstone -
Mini Facebook Clone
Java, JSP, Tomcat, MySQL
→ Mini Facebook -
Operating Systems Algorithms & Data Structures (C++)
→ Operating Systems Project -
Digital clock designed with logic circuits (Multisim)
-
Doctor appointment registration system (Visual Basic)
-
Patient & physician visit management using data structures & algorithms (C++)
-
Portable charger electronic design (Multisim)
-
Elevator control circuit emulation (Multisim)
-
Blood donation non-profit database (MySQL)
- Languages: C, C++, C#, Go, Rust, Java, Python
- Frameworks & Platforms: .NET, Android Studio
- Databases: MySQL, SQLite
- Tooling:
Visual Studio, Visual Studio Code, Git, GitLab, TeamCity, Ansible - Reverse Engineering & Debugging:
Ghidra, Immunity Debugger, x64dbg / x86dbg, Process Hacker
- Red Teaming / Offensive Security
- Malware Development & Analysis
- Reverse Engineering
- Vulnerability Assessment
- Network Security
- SIEM / SOAR
- Microsoft Defender for Endpoint
- Microsoft Sentinel
- Kaspersky & Trend Micro
- Kali Linux
- Cloud application development & deployment
- Operating systems development
- Algorithms & data structures
- Linux administration & hardening
- Windows internals
- Electrical & logic circuit design
- Desktop & web development
- Database design & management
- Mathematics:
- Discrete Mathematics
- Numerical Methods
- Calculus I & II
- Red team tooling and operator-grade development
- Building C/C++, C#, and Go tooling for EDR evasion and ASR rule bypassing
- Research into ETW/AMSI patching, DLL unhooking, loaders, and injection techniques
- Discord:
_racoten_

