Skip to content
View maxDcb's full-sized avatar

Block or report maxDcb

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
maxDcb/README.md

Maxime DCB

Principal Security Engineer focused on application security, C++ security tooling, Windows internals, and offensive security engineering.

I build and document lab-oriented security tools to explore how offensive mechanisms work under the hood: loader internals, C2 architecture, security tooling design tradeoffs, application security, Kubernetes/OpenShift security modeling, and security automation.

My public work is intended for authorized research, education, and controlled lab environments.

Current focus

  • Offensive security engineering
  • C++ tooling for security research
  • Windows internals and PE loading mechanisms
  • Application security and secure code review
  • C2 architecture and operator/tooling workflows
  • Kubernetes/OpenShift security modeling
  • Agentic AI for security tooling and research workflows
  • LLM-assisted development and security automation

Selected projects

  • DreamWalkers — lab research around Windows loader internals, PE loading, stack artifacts, and execution tradeoffs.
  • Exploration C2 — educational C2 architecture project for studying teamserver, client, listener, and agent design.
  • Technical blog — engineering notes and security research.
  • Kubernetes/OpenShift security research — graph-based approaches to understanding RBAC, SCC, service accounts, routes, and attack paths.

Public research boundaries

The views, research, and content shared here are my own and do not represent, reflect, or speak for my employer.

All content is published for authorized security research, education, and controlled lab environments only.

GitHub activity

Maxime's GitHub stats

Top languages

Pinned Loading

  1. DreamWalkers DreamWalkers Public

    Lab research on Windows loader internals, PE loading, stack artifacts, and execution tradeoffs.

    C 232 45

  2. C2TeamServer C2TeamServer Public

    TeamServer and Client of Exploration Command and Control Framework

    Python 184 34

  3. C2Implant C2Implant Public

    Windows C++ Implant for Exploration C2

    CMake 48 11

  4. C2Core C2Core Public

    Core C++ library for C2 architecture, message handling, and security tooling experiments.

    C++ 24 6

  5. C2LinuxImplant C2LinuxImplant Public

    Linux C++ Implant for Exploration C2

    CMake 19 5