Skip to content
View 0xPersist's full-sized avatar

Block or report 0xPersist

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
0xPersist/README.md

0xPersist

Research Profile

Overview

This profile documents ongoing technical research at the intersection of offensive security, network intelligence, and adversarial systems analysis. The work is oriented toward a central problem: understanding how modern threat actors operate below the threshold of conventional detection, and building systematic methods to surface that activity before it materializes into impact.

The research is not purely academic. It is applied, empirical, and operationally grounded. Rigor is measured by whether findings hold under adversarial conditions, not just controlled environments.


Research Domains

Adversarial Simulation and Red Team Methodology

Systematic emulation of threat actor tradecraft, including persistence mechanisms, lateral movement patterns, and command-and-control infrastructure design. Research emphasis is on fidelity to real-world actor behavior rather than synthetic or idealized attack models.

Network Traffic Analysis and Behavioral Detection

Protocol-level analysis of network communications with a focus on identifying covert channels, beaconing behavior, and traffic anomalies that evade signature-based detection. This includes long-dwell beacon detection, DNS tunneling analysis, and encrypted traffic classification without decryption.

Threat Intelligence and Adversarial Pattern Recognition

Structured collection, normalization, and correlation of threat intelligence across technical and behavioral domains. Research focuses on developing detection primitives from first principles rather than relying solely on published indicators of compromise, which are by definition retrospective.

Endpoint Forensics and Incident Analysis

Memory forensics, process execution analysis, and artifact reconstruction in post-compromise environments. Emphasis on understanding attacker decision trees from forensic evidence and identifying tradecraft signatures that persist across tooling changes.

Security Automation and Autonomous Analysis Systems

Design and implementation of systems capable of performing triage, enrichment, and preliminary analysis without human-in-the-loop intervention. Research examines the conditions under which automated reasoning can be trusted, the failure modes of autonomous detection pipelines, and the architecture decisions that affect both performance and auditability.

Applied Machine Learning in Security Contexts

Anomaly detection and event classification using supervised and unsupervised learning approaches. Particular interest in the robustness of models trained on operational data and their susceptibility to evasion through adversarial inputs.


Methodological Approach

Research follows a structured, hypothesis-driven methodology. Problems are defined in terms of attacker capability and defender visibility gaps. Each research area begins with a threat model that identifies the adversary, their objectives, their constraints, and the detection surface available to a defender.

Findings are validated empirically. Claims about detection efficacy are tested against both synthetic and real-world data. Where possible, red team validation is used to confirm that detections hold under active evasion attempts rather than passive simulation.

Reproducibility is a first-order concern. Methods are documented with sufficient precision that results can be independently verified. This discipline applies equally to tooling, data pipelines, and analytical conclusions.

The work draws from multiple disciplines: network science, formal systems analysis, and classical computer science. Cross-disciplinary synthesis is deliberate, not incidental.


Tooling and Technical Capabilities

Languages: Python, Bash, SQL, with working proficiency in Go and PowerShell for offensive and defensive tooling contexts.

Analysis and Detection: Network packet capture and protocol dissection, log aggregation and correlation, SIEM integration, endpoint detection and response telemetry analysis, memory analysis frameworks, and behavioral baselining.

Offensive Tooling: Exploitation frameworks, payload development, covert channel construction, and adversary emulation platforms used in authorized research and red team contexts.

Intelligence Platforms: Threat intelligence platforms, indicator management systems, MITRE ATT&CK-aligned detection mapping, and open-source intelligence collection pipelines.

Infrastructure: Linux systems administration, containerized service deployment, network segmentation, and secure research environment construction. Overlay network design for segmented lab environments.

Automation and Orchestration: Custom pipeline development for data normalization, event correlation, and automated triage. API integration across security tooling ecosystems.


Selected Work

The following describes categories of completed or ongoing research without reference to specific repositories or identifiable implementations.

Beacon Detection at Scale Development of statistical methods for identifying low-and-slow command-and-control beaconing behavior within high-volume network traffic. Research examined the limitations of interval-based detection and proposed supplementary approaches based on jitter analysis and connection persistence modeling.

Autonomous Triage Pipeline Design Architecture and implementation research for security event triage systems capable of classifying, enriching, and escalating events without human intervention at the first tier. Research included failure mode analysis, false positive management strategies, and the design of audit trails sufficient for post-incident review.

IOC Enrichment and Composite Scoring Development of tooling for rapid multi-source indicator enrichment, including composite threat scoring methodologies that weight source reliability, indicator recency, and cross-platform corroboration.

Detection Rule Validation Frameworks Methods for validating detection logic against synthetic log events prior to production deployment, including rule linting, coverage mapping against ATT&CK techniques, and regression testing against known-good baselines.


Security Philosophy

Security research carries ethical obligations that are not optional and do not diminish under competitive or commercial pressure. The following principles govern this work:

Adversarial thinking is a discipline, not a posture. Effective defense requires genuine understanding of offensive methodology. Surface-level familiarity with attacker tools is insufficient. The goal is to understand how an adversary reasons, what constraints they operate under, and how those constraints create detectable patterns.

Detection must be earned, not assumed. A control is not effective because it exists. It is effective only if it demonstrably surfaces the behavior it is designed to detect, under conditions that approximate real-world adversary operations. All detection claims are treated as hypotheses until validated.

Responsible disclosure is non-negotiable. Vulnerabilities identified in the course of research that affect systems beyond the authorized research scope are handled according to established responsible disclosure frameworks. This is not a strategic calculation. It is a baseline ethical commitment.

Opacity in adversary knowledge is a strategic asset. Publication decisions are made deliberately. Not all research is disclosed publicly. Detection methods, behavioral models, and architectural decisions with ongoing operational value are protected accordingly.

Simplicity is a security property. Complex systems fail in complex ways. Architectural decisions that reduce surface area, limit trust propagation, and make system state auditable are preferred over feature-rich but opaque alternatives.


Areas of Ongoing Inquiry

Adversarial Robustness of Security ML Models The susceptibility of machine learning-based detection systems to targeted evasion. Research examines whether adversaries with knowledge of model architecture can systematically reduce detection rates, and what architectural mitigations are effective.

Large Language Models as Security Analysis Tools The application of large language models to security tasks including log analysis, alert triage, and threat intelligence synthesis. Research includes both capability assessment and failure mode analysis, with particular attention to hallucination risk in high-stakes classification contexts.

Supply Chain and Dependency Risk The security implications of software supply chain complexity, including dependency confusion, build pipeline compromise, and the difficulty of establishing provenance in modern development environments.

Pre-Compromise Detection Methods for detecting attacker activity during the reconnaissance and initial access phases, before post-exploitation tooling is deployed. Research focuses on the indicators available at this stage and the architectural decisions that increase defender visibility during the earliest phases of an intrusion.


Collaboration

This profile is maintained for research documentation and community engagement purposes. Collaboration inquiries relevant to the domains described above are considered on their merits. There is no standing commitment to respond to unsolicited outreach, but substantive technical engagement is welcomed.

All collaboration is conducted under the assumption that both parties operate within applicable legal frameworks and adhere to responsible research standards. Research conducted under this profile does not extend to unauthorized access, offensive operations against non-consenting parties, or work in support of actors whose objectives conflict with the principles stated above.

Popular repositories Loading

  1. ioc-pivot ioc-pivot Public

    CLI tool for rapid IOC enrichment , IPs, domains, and hashes against VirusTotal, AbuseIPDB, and Shodan

    Python

  2. zeek-quick zeek-quick Public

    Zeek log triage tool - instant analysis of conn, dns, http, and ssl logs from the terminal

    Python

  3. sigma-check sigma-check Public

    Sigma rule validator, linter, and tester — validate syntax, lint for issues, and test rules against sample log events.

    Python

  4. 0xPersist 0xPersist Public

  5. beacon-score beacon-score Public

    Multi-signal C2 beacon detector. Correlates Zeek conn.log, dns.log, and ssl.log to score and rank beacon candidates with per-signal breakdowns and ATT&CK mapping.

    Python

  6. ttl-watch ttl-watch Public

    Multi-signal DNS anomaly detector for TTL manipulation, DGA, fast-flux, and DNS tunneling from Zeek logs or PCAP.

    Python