MaxDcb Research

Technical research notes on offensive security engineering, low-level tooling, and security architecture. I write about how security tools are built, how runtime mechanisms behave, how protocols and modules are structured, and how complex systems can be analyzed from an attacker-informed engineering perspective.

The main areas covered here are:

Boundaries

The views, research, and content shared here are my own and do not represent, reflect, or speak for my employer.

All content is published for authorized security research, education, and controlled lab environments only.

Latest Articles

Building a Modern C2 - Part 4: Modules

How Exploration C2 modules are loaded, executed, unloaded, and shared between TeamServer and beacon implementations.

  • c2
  • modules
  • memorymodule
  • beacon
  • stealth
  • templates

Building a Modern C2 - Part 2: GUI

How the Exploration C2 GUI is structured, how it communicates with the TeamServer, and how operator panels fit together.

  • c2
  • gui
  • python
  • grpc
  • operator-workflows

Data: My C2 Agent

How an OpenAI-backed assistant panel became an agent inside the Exploration C2 client.

  • c2
  • codex
  • openai
  • agent
  • gui

My Journey with Codex

Lessons learned from using Codex on C2Core, module templates, tests, and DNS communication work.

  • codex
  • c2
  • ai-assisted-development
  • testing
  • templates

Building a Modern C2: Introduction

Introduction and roadmap for the Building a Modern C2 series on Exploration C2.

  • c2
  • architecture
  • authorized-research
  • exploration-c2

DreamWalkers

Research notes on DreamWalkers, a reflective PE loading study with unwind metadata registration, stack behavior analysis, and CLR runtime support.

  • windows-internals
  • pe-loading
  • reflective-loading
  • stack-unwinding
  • clr