getuid
Offensive Researcher & Red Team Operator
I specialize in advanced EDR evasion, red team tooling, and offensive security research.
Open to full-time offensive security roles
01. about me
I'm an offensive security researcher based in Singapore, currently pursuing a Bachelor's in Information Security at the Singapore Institute of Technology while working as a Cyber Offensive Intern at softScheck APAC.
I build open-source offensive tooling focused on EDR evasion, C2 infrastructure, and post-exploitation.
I share my research on my blog, where I write about in-memory evasion, tradecraft etc.
02. experience
03. projects
I build and maintain open-source offensive security tooling focused on EDR evasion, C2 frameworks, and red team tradecraft. All projects live on my GitHub.
04. credentials
05. awards
06. research
Presented at Division Zero on modern in-memory evasion tradecraft for red teams, exploring techniques to bypass enterprise EDRs while operating with Beacon. Covered live demonstrations, detection logic analysis, and practical evasion strategies for modern defensive stacks.
07. contact
I'm currently open to full-time roles in offensive security and red teaming. If you think I'd be a good fit, feel free to reach out.
ethanseowyh@gmail.com