user@sophireak:~/research_focus$ cat current_objectives.txt > Primary: eBPF-Based Kernel Stealth & Visibility Manipulation > Secondary: CompTIA Security+ & Advanced CTF Exploitation > Values: clarity · reproducibility · scoped experimentation
- Reconnaissance: Attack surface assessment and service enumeration.
- Controlled Exploitation: Technique validation within strict, well-defined scopes.
- Post-Exploitation: Artifact collection and detection engineering analysis.
- Reporting: Structured Markdown/LaTeX documentation with remediation guidance.
| LOW-LEVEL & KERNEL | OFFENSIVE OPS (CTF/LAB) | TELEMETRY & ANALYSIS |
|---|---|---|
|
Syscalls · Kprobes · Memory |
PrivEsc · Web · Active Directory |
Detection Eng · Forensics |
Infrastructure & Reproducibility:
|
Engagement Policy: - Tests performed only with explicit permission. - Focus on education and defense. - Define scope and success criteria up front. |
Connection: sophireaksoeng@gmail.com Collabs via Issues/Discussions |
/* --- kernel panic: end of file --- */

