oz@darkavenger ~ bash
DRILL

OZ ABRAMOVICH

Red Teamer · Malware Dev · Infrastructure Operator
I build offensive systems.
I run the infrastructure behind them.
I help teams learn to defend for real.

I am 16, and I build real systems under pressure: malware tooling for UB Lockdown, full red-vs-blue infrastructure for my high school, and CanaryDefense, a deception operations platform for deploying honeypots, streaming threat telemetry, and speeding up incident response. DRILL started as a weekend idea and became a real C2 framework with 34 stars and 936 commits. I do not ship demos. I ship what gets used.

UB Lockdown Red Team // Malware Development // Red vs Blue Infrastructure // VLAN Design + Segmentation // VM Clustering + Ops // Python · Flask · Socket.IO // C2 Framework Engineering // Blue Team Education // Dark-Avenger-Reborn // DEF CON 33 Inspired Builder // UB Lockdown Red Team // Malware Development // Red vs Blue Infrastructure // VLAN Design + Segmentation // VM Clustering + Ops // Python · Flask · Socket.IO // C2 Framework Engineering // Blue Team Education // Dark-Avenger-Reborn // Buffalo, NY //
PROJECTS
01 / Projects
Work
All Repos ↗
~/projects
fetching repos...
Overview
README
📂
Select a repository
EXPERIENCE
02 / Experience
History
01
Red Teaming at UB
// UB Lockdown
  • Built and deployed advanced malware tooling used by UB Lockdown red team operators.
  • Ran offensive operations while coordinating realistic attack pressure across live services.
  • Focused on practical outcomes: resilient payloads, stable C2 workflows, and repeatable execution.
2024—
Competitive Security · Red Team
02
CanaryDefense
// Reef Solutions
  • Built the platform end-to-end as a unified command center for deception operations and incident response.
  • Implemented one-command Linux deployment flow with systemd-managed honeypot clients for rapid rollout.
  • Added 25+ protocol coverage and real-time Socket.IO telemetry with filtering, classification, and alert workflows.
  • Shipped practical operator value fast: multi-honeypot management, live logs, and response-ready intelligence.
2026—
Builder · Security Product
03
Hosting Red Team Competitions
// High School Red vs Blue Program
  • Designed and hosted full red-vs-blue events on infrastructure I built and operated myself.
  • Managed networking, VMs, clustering, malware deployment, and scoring automation end-to-end.
  • Built a service grader that checks SSH, ping, web, and AD, then assigns live points to teams.
  • Served as the only red teamer while also mentoring student blue teams on defensive response.
2025—
Organizer · Offensive Security
SKILLS
03 / Skills
Arsenal
Offensive
Malware Development0%
C2 Framework Dev0%
Persistence Engineering0%
Adversary Emulation0%
DevOps
Networking + VLAN Segmentation0%
VM Ops + Clustering0%
Docker / Kubernetes0%
Service Reliability Engineering0%
Languages
Python0%
C / C#0%
Bash0%
JavaScript0%
Detection
Blue Team Coaching0%
Attack Simulation Labs0%
Defensive Validation Tooling0%
Tools & Everything Else
Burp SuiteMetasploit WiresharkNmap FlaskSocket.IO PrometheusProxmox DockerLinux GitUnity MongoDBActive Directory NginxFlask
16
Age. Already Shipping.
CONTACT
04 / Contact
Let's Talk
Got something
interesting?

If you are building serious cybersecurity work and want someone who can both build and break systems, reach out. Security research, malware analysis, infrastructure operations, and network engineering collaborations are welcome. Typical response time: within 48 hours.

Direct Contact
Email Me Directly

Email me about anything - projects, ideas, questions, or just to connect. I usually reply within 48 hours.

ozabramovs@gmail.com