I'm a security researcher focused on red teaming and web application security, with a strong interest in reverse engineering, exploit development, and low-level Windows internals.
-
WinDriver‑EXP - A repository of Proof-of-Concepts (PoCs) for vulnerable Windows drivers, written by me.
-
BYOVDFinder - Identifies LOLDrivers that are not blocked by the active HVCI policy — ideal for BYOVD scenarios.
-
Patch‑Tuesday - A site that efficiently tracks Microsoft Patch Tuesday updates for vulnerability analysis and patch diffing. The full website is published at patch-tuesday.pwnfuzz.com.
-
BYOVD Watchdog - Real-time analysis of LOLDrivers against Microsoft's HVCI blocklist. The full website is published at byovd-watchdog.pwnfuzz.com.
- I publish my own technical research and learning notes on ghostbyt3.github.io. The content ranges from Windows kernel internals and exploit techniques to deep dives on specific CVEs and personal notes on topics I’m currently exploring.
- CTF write-ups and content related to web exploitation and red teaming can be found on my other blog at ctf.pwnfuzz.com.
- In parallel, I co-manage labs.pwnfuzz.com, which serves as a platform for vulnerability research under the PwnFuzz organization. There, we publish Patch Tuesday breakdowns, vulnerability write-ups, and n-day exploit analyses.
- 📘 LinkedIn: Nikhil
- ✉️ Email: nikhiljohn2104@gmail.com
- 🖋 Blog: ghostbyt3.github.io
Thanks for stopping by! I’m always up for discussing kernel internals, reverse-engineering, and offensive tooling. 🚀