Offensive Security Researcher and Malware Engineer with 5+ years of hands-on experience in adversary simulation, offensive tooling R&D, OSINT operations, and structured threat intelligence research conducted in controlled lab environments.
My work focuses on:
- Structured attack-chain modeling aligned with real-world adversarial methodology
- Malware behavior analysis and custom tooling experimentation
- Privilege escalation and post-exploitation research
- Infrastructure mapping and OSINT-driven intelligence gathering
- Offensive automation and secure systems engineering
All experimentation and capability development is performed in isolated research environments for structured analysis and defensive validation.
I approach systems from a structural perspective: understanding how weaknesses combine into realistic compromise paths under adversarial pressure.
-
Adversary Simulation: Structured modeling of attack paths including initial access vectors, lateral movement analysis, persistence mechanisms, and objective-driven execution within controlled lab environments.
-
Malware Engineering & Tooling R&D: Custom payload experimentation, loader design, crypter research, runtime behavior modeling, and evasion technique analysis.
-
Post-Exploitation Research: Privilege escalation pathways, credential access techniques, trust-boundary analysis, and persistence modeling under isolated testing conditions.
-
Reconnaissance & OSINT: Infrastructure mapping, attack surface discovery, behavioral pattern research, and open-source intelligence analysis.
-
Secure Engineering: Golang tooling, Python automation, Linux internals, API orchestration, and secure pipeline development.
| Project | Description | Stack | Status | Year |
|---|---|---|---|---|
| IDify | Decentralized identity & credential protocol | React, Aptos SDK, Solidity | Archived | 2025 |
| HopZero-DNS | High-performance DNS resolution engine | Golang | Active | 2025 |
| Incognito-Vault | Web security demo & cryptographic analysis | Python Flask | Archived | 2024–2025 |
| ClopiMedi | Secure ML health analysis (synthetic data) | Python, ML | Archived | 2024 |
| Mayabati | Bi-LSTM recipe recommendation engine | Python, Bi-LSTM | Paused | 2025 |
- 3rd Place – 1st International Conference on Smart Technology for Emerging Problems (STEP 2025)
- Top 5 Finalist – IEEE–IC Standard Hackathon & APSIMSS (IIT Guwahati, 2024)
All official communication is cryptographically signed.
- Owner: Mr. Biswadeb Mukherjee
- Email: admin@official-biswadeb941.in
- OpenPGP Fingerprint:
2D31 1898 5F46 8437 F8E6 0B9E A2F0 3FF3 10A0 EE1F - Public Key: https://keys.openpgp.org/vks/v1/by-fingerprint/2D3118985F468437F8E60B9EA2F03FF310A0EE1F
curl -L -o official.asc http://official-biswadeb941.in/official-biswadeb941_v2.txt.asc
curl -L -o public-key.asc "https://keys.openpgp.org/vks/v1/by-fingerprint/2D3118985F468437F8E60B9EA2F03FF310A0EE1F"
gpg --import public-key.asc
gpg --fingerprint 2D3118985F468437F8E60B9EA2F03FF310A0EE1F
gpg --verify official.ascOpen to collaboration involving:
- Adversary Simulation
- Offensive Security Research
- Malware Engineering R&D
- OSINT & Threat Intelligence
- Secure Architecture Review
- Secure Software Engineering
All research, tooling, documentation, and publications are governed by clearly defined legal and ethical boundaries.
For full legal policy and usage terms: https://official-biswadeb941.in/legal-policy
- Email: admin@official-biswadeb941.in
- LinkedIn: https://linkedin.com/in/biswadeb-mukherjee
- Website: https://official-biswadeb941.in


