Skip to content
You must be logged in to sponsor fin3ss3g0d

Become a sponsor to Dylan Evans

Tier List

  • $5 a month - Earn a sponsorship badge on your profile.
  • $10 a month - Gain access to my private Sponsors repository
  • $10 one time - Get a shout out on Twitter (X)
  • $25 a month - Gain access to the DragonBot private repository

Hello, I'm Dylan Evans πŸ‘‹

I'm a passionate cybersecurity professional, dedicated to continuous learning and mastery in the field πŸŽ“. My certifications include:

  • Offensive Security Experienced Penetration Tester (OSEP),
  • Offensive Security Certified Professional (OSCP),
  • Certified Red Team Operator (CRTO) from Zero-Point Security.
  • Certified Red Team Lead (CRTL) from Zero-Point Security.

My journey in cybersecurity has led me to delve deep into advanced topics, and I've spearheaded complex research into social engineering tactics, including proxy-in-the-middle attacks 🎣.

In my project, EvilGophish, I developed phishlets capable of bypassing multi-factor authentication for big names like Microsoft, KnowBe4, and Cisco VPN portals. I've also introduced social engineering features that are unavailable anywhere else at the time of writing including:

  • QR code phishing
  • SMS phishing
  • Malleability

In addition to my public contributions, I've ventured into private malware development 🦠, crafting solutions that successfully evade detection from leading EDR/XDRs such as CrowdStrike, CyberReason, Cylance, Microsoft Defender for Endpoint (MDE) and SentinelOne. By keeping this code closed-source πŸ”’, I've ensured its effectiveness in bypassing security solutions. I have experience writing malware in various languages such as C/C++, Assembly, C#, Go, Python, PowerShell and Nim. I have researched and implemented various evasive malware tactics including:

  • Process injection
  • Process hollowing
  • Module stomping
  • DLL injection
  • Shellcode loading
  • Reflective PE/DLL loading
  • Heap encryption
  • Stack encryption
  • Sleep obfuscation
  • ROP chaining
  • Direct/Indirect system calls
  • Hardware breakpoints
  • ETW/AMSI patching
  • DLL unhooking
  • Thread call stack spoofing
  • PPID spoofing
  • Token impersonation
  • In-memory .NET assembly loading
  • Developing BOFs and BOF loaders
  • Shellcode fluctuation
  • Threadless process injection
  • Proxy DLL loading

My mission πŸš€

I strive to build robust, user-friendly tools for the cybersecurity community and advance our collective understanding of the evolving threat landscape. Your sponsorship will enable more in-depth research, the development of new tools, and the sharing of knowledge, all aimed at creating a safer digital world.

Speech recognition 🎀

I am also a huge advocate, supporter, creator, and user of speech recognition products for the disabled or physically injured and in general. I think it is a creative way to reduce strain on the body after exploring it and I have found it to be even more efficient at times than if I were to be using a keyboard and mouse. I created DragonBot as an extension for Dragon NaturallySpeaking which can provide the complete hands-free control of a Microsoft Windows computer via voice commands. Watch the demo here and sponsor the tier for access.

Your support πŸ’–

Every bit of sponsorship is appreciated and will be directly reinvested into the open-source community, enabling ongoing development and exploration of advanced cybersecurity topics.

Thank you for your support and for joining me on this journey.

Contact Information

Questions? Concerns? You can shoot me an email here.

@fin3ss3g0d

Reaching 100 sponsors would mean the absolute world to me! I am humbled by the continued support of my sponsors. A lot of stuff has been in the works lately, including advanced malware development and social engineering techniques. Thanks to the support of my sponsors, I have been able to advance my research and knowledge sharing capabilities. I have started my own blog to give back to the community and my sponsors. The continued support motivates me to continue providing for this awesome community, my repositories have seen a lot of updates recently and I encourage you to become a sponsor. Any bit of support will help my journey. Let's reach this goal!

Current sponsors 79

Private Sponsor
Private Sponsor
Private Sponsor
@brettgus
Private Sponsor
Private Sponsor
Private Sponsor
Private Sponsor
@RootInj3c
Private Sponsor
@SV-ZeroOne
Private Sponsor
Private Sponsor
@EliteCodexer
@vaadata
@childs999-personal
@LeuchterAwareness
@mcdave2k1
Private Sponsor
Private Sponsor
Private Sponsor
@Cqzz11
@Art-Fakt
@ElGorit0
Private Sponsor
@0xfL0ki
@VirtualAlllocEx
Private Sponsor
Private Sponsor
@Clipsec
@grishakoq
Private Sponsor
Private Sponsor
Private Sponsor
@watson0x90
Private Sponsor
Private Sponsor
Private Sponsor
Private Sponsor
Private Sponsor
@love5555faye
Private Sponsor
Private Sponsor
@JeppeHJ
Private Sponsor
Private Sponsor
Private Sponsor
Private Sponsor
Private Sponsor
@bik3te
@guerr3
@kucingkuku
@homa1978
Private Sponsor
Past sponsors 176
@lord-dubious
Private Sponsor
@jetsky22
@fp4e
Private Sponsor
Private Sponsor
@Drcapable03
Private Sponsor
Private Sponsor
Private Sponsor
Private Sponsor
@ufstpeter
Private Sponsor
Private Sponsor
Private Sponsor
@0xSV1
Private Sponsor
Private Sponsor

Featured work

  1. fin3ss3g0d/HookFinder

    Simple PoC to locate hooked functions by EDR in ntdll.dll

  2. fin3ss3g0d/evilgophish

    evilginx3 + gophish

  3. fin3ss3g0d/cypherhound

    Python3 terminal application that contains 405 Neo4j cyphers for BloodHound data sets and 388 GUI cyphers

    Python 373
  4. fin3ss3g0d/secretsdump.py

    Enhanced version of secretsdump.py from Impacket. Adds multi-threading and accepts an input file with a list of target hosts for simultaneous secrets extraction.

    Python 203
  5. fin3ss3g0d/NativeThreadpool

    Work, timer, and wait callback example using solely Native Windows APIs.

79% towards 100 monthly sponsors goal

@brettgus @Art-Fakt
@CodedPapaya @RootInj3c @SV-ZeroOne @vaadata @EliteCodexer

brettgus and 78 others sponsor this goal

Select a tier

$ a month

You'll receive any rewards listed in the $10 monthly tier. Additionally, a Public Sponsor achievement will be added to your profile.

$5 a month

Select
  • Get a Sponsor badge on your profile

$10 a month

Select
  • Access to private repositories

    • AddDomainAdmin
    • AddLocalAdmin
    • EvilGophish
    • Modded Gophish
    • CypherHound
    • PrivStrip
    • mailgunner
    • DropExec
  • Early access to latest versions of public repositories

$25 a month

Select

Access to the private repository DragonBot is stored in along with the complete documentation and installation instructions.