Skip to content

Alessandro Grisa

Hive Member

Alessandro Grisa

ABOUT ALESSANDRO

Alessandro Grisa is a CovertSwarm Hive Member. Red teamer specialized in covert operations. Since joining the Swarm in September 2021, he’s been building malware deployment techniques that evade modern EDR and MDR solutions. His focus? OPSEC-safe payload delivery. Moreover, he researches process injection methods that bypass detection at the API level.

His expertise isn’t just software. In fact, Alessandro is a hardware and IoT hacker. Additionally, he led CovertSwarm’s DEFCON badge project. From designing PCBs in KiCad to hand-soldering 0603 components. Furthermore, he created hardware CTF challenges that introduced attendees to hardware hacking culture. Consequently, he understands attack surfaces across digital and physical domains.

Currently, Alessandro develops novel process injection techniques. His ModuleOverride method targets DLL memory space instead of PE entry points. Therefore, it avoids triggering common EDR alerts. His earlier “Process No-Hollowing” technique leveraged undocumented Windows API behavior. Specifically, exploiting WriteProcessMemory’s automatic memory protection manipulation. Microsoft’s response? “This cannot be considered a vulnerability as no security boundary is crossed.” Instead, he turned it into a working exploit.

His credentials include CRTO (Certified Red Team Operator), Social Engineering Expert, CRTP, CEH, and ECPPT certifications. Not just paper qualifications. Proof of hands-on capability across red teaming, social engineering, and penetration testing domains.

Beyond malware development, Alessandro is also a DEFCON 33 speaker. Alongside Ibai Castells, he delivered a workshop at Red Team Village on ModuleOverride process injection. Ultimately, his philosophy applies to offensive security. Find the gaps defenders don’t monitor. Then exploit assumptions baked into legitimate tools.

 

RESEARCH & PUBLICATIONS

Alessandro’s research focuses on evasion techniques, process injection, and hardware security. Both technical deep-dives and hands-on projects:

 

Speaking & Community Engagement

Alessandro shares his offensive security research at major hacker conferences:

Recent Appearances

  • DEFCON 33 – Red Team Village (August 2025)
    “ModuleOverride Process Injection Technique” – Workshop
    Co-presented with Ibai Castells on novel evasion techniques

 

Areas of Expertise

  • Red Teaming – Covert operations and adversary simulation
  • Malware Development – OPSEC-safe payload deployment techniques
  • Process Injection – Novel evasion techniques bypassing EDR/MDR
  • Hardware Hacking – PCB design, firmware development, and embedded security
  • IoT Security – Device exploitation and hardware CTF challenge design
  • Penetration Testing – Full-spectrum attack methodologies
  • Network Security – Infrastructure compromise and lateral movement
  • Cloud Security – Cloud environment exploitation

Connect