Skip to content
View S4CH's full-sized avatar
🎯
Creating new disturbance to diminish the older ones
🎯
Creating new disturbance to diminish the older ones

Sponsoring

@s0md3v

Organizations

@devs-nest @aurae-runtime @infosec-MNIT

Block or report S4CH

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
S4CH/README.md

Hey there, I am Sachin!👋

Sachin Cy5un Sachin K. Dhaka CyFun CyFun Cy5un

Intro

Security Engineer from India working with a US cybersecurity firm, doing purple team work. Got my BTech from MNIT Jaipur in 2024.

I focus on eBPF security, EDR research, and threat intelligence. My work ranges from analyzing eBPF internals to hunting down C2 infrastructure and tracking phishing campaigns.

What I'm Into

eBPF Security: JIT compilers, verifier bypasses, and detection/evasion techniques

EDR Research: Understanding detection engines and bypass methods

Threat Intelligence: Tracking threat actors, analyzing phishing campaigns, and hunting C2 infrastructure

Binary Exploitation: Reverse engineering and vulnerability research

Purple Team Operations: Building detections and threat hunting

Experience & Learning

I work with GDB, eBPF, EDR reverse engineering, and C2 traffic analysis. Most of my research gets documented in blog posts.

Solved 100+ CTF challenges across HackTheBox, TryHackMe, and competitions. Completed pwn.college modules for binary exploitation fundamentals. My writeups cover beginner to advanced exploitation techniques.

Background in phishing campaign analysis and C2 infrastructure hunting - connecting IOCs and tracking threat actor patterns. Currently exploring how eBPF impacts both offensive and defensive security.

You can find my research and discoveries at s4ch.github.io.

Pinned Loading

  1. s4ch.github.io s4ch.github.io Public

    Another random blog about security

    HTML 9 2

  2. FIRMCORN-V2 FIRMCORN-V2 Public

    Forked from FIRMCORN-Fuzzing/FIRMCORN

    The first vulnerability-oriented fuzzer for IoT firmware

    Assembly 6 2

  3. completely-fair-scheduler completely-fair-scheduler Public

    CFS is an implementation of a well-studied, classic scheduling algorithm called weighted fair queuing and I implemented it in rust

    Rust 10 1

  4. anti-software/anticorp-wiki anti-software/anticorp-wiki Public

    Wiki for #resources in our private server

    4 3