Cyber Security ResearcherFocus @ Binary Security & Reverse Engineering

I specialise in low-level vulnerability research, reverse engineering, and binary protection—uncovering critical flaws, crafting PoC exploits, and designing hardened counter-measures to secure modern software ecosystems. In my spare time, I enjoy exploring encryption & decryption algorithms, breaking and building cryptographic schemes for both curiosity and continuous learning.

Binary Reversing

Proficient in static and dynamic disassembly with IDA Pro, Ghidra and radare2. Capable of reconstructing program logic, data structures and control flows from stripped, obfuscated binaries.

Skill Tree

Explore an interactive map of my core competencies—spanning binary exploitation, reverse engineering, full-stack web defense, cloud hardening and red-/blue-team operations. Hover to reveal detailed milestones and learning paths.

Coding Languages

From low-level C/C++ and Rust for performance-critical modules, through Go for scalable backend services, to Python and TypeScript for rapid prototyping—my tool-belt balances speed, safety and developer ergonomics.

Static Analysis
Leverage SAST tooling and custom IDA scripts to surface dangerous patterns before they reach production.
Dynamic Testing
Combine instrumented fuzzing and runtime hook frameworks to catch logic faults and privilege-escalation paths.
Patch Review
Thoroughly validate vendor fixes, measure performance impact and ensure no regression or new exposure.
Threat Modeling
Identify trust boundaries, attack surfaces and high-value assets to prioritise mitigations effectively.
Secure SDLC
Embed security gates, automated scans and peer review into CI/CD for continuous assurance.
Static Analysis
Leverage SAST tooling and custom IDA scripts to surface dangerous patterns before they reach production.
Dynamic Testing
Combine instrumented fuzzing and runtime hook frameworks to catch logic faults and privilege-escalation paths.
Patch Review
Thoroughly validate vendor fixes, measure performance impact and ensure no regression or new exposure.
Threat Modeling
Identify trust boundaries, attack surfaces and high-value assets to prioritise mitigations effectively.
Secure SDLC
Embed security gates, automated scans and peer review into CI/CD for continuous assurance.
Static Analysis
Leverage SAST tooling and custom IDA scripts to surface dangerous patterns before they reach production.
Dynamic Testing
Combine instrumented fuzzing and runtime hook frameworks to catch logic faults and privilege-escalation paths.
Patch Review
Thoroughly validate vendor fixes, measure performance impact and ensure no regression or new exposure.
Threat Modeling
Identify trust boundaries, attack surfaces and high-value assets to prioritise mitigations effectively.
Secure SDLC
Embed security gates, automated scans and peer review into CI/CD for continuous assurance.
Static Analysis
Leverage SAST tooling and custom IDA scripts to surface dangerous patterns before they reach production.
Dynamic Testing
Combine instrumented fuzzing and runtime hook frameworks to catch logic faults and privilege-escalation paths.
Patch Review
Thoroughly validate vendor fixes, measure performance impact and ensure no regression or new exposure.
Threat Modeling
Identify trust boundaries, attack surfaces and high-value assets to prioritise mitigations effectively.
Secure SDLC
Embed security gates, automated scans and peer review into CI/CD for continuous assurance.

Security Auditing

Deliver comprehensive security assessments covering secure code review, hands-on penetration testing, exploit reproduction and tailored hardening guidelines—culminating in a concise, executive-friendly report and a developer-ready remediation checklist.

Technology Stack

C++ logo
C++
C logo
C
CLion logo
CLion
CMake logo
CMake
Rust logo
Rust
Go logo
Go
WebAsm logo
WebAsm
LLVM logo
LLVM
C++ logo
C++
C logo
C
CLion logo
CLion
CMake logo
CMake
Rust logo
Rust
Go logo
Go
WebAsm logo
WebAsm
LLVM logo
LLVM
C++ logo
C++
C logo
C
CLion logo
CLion
CMake logo
CMake
Rust logo
Rust
Go logo
Go
WebAsm logo
WebAsm
LLVM logo
LLVM
C++ logo
C++
C logo
C
CLion logo
CLion
CMake logo
CMake
Rust logo
Rust
Go logo
Go
WebAsm logo
WebAsm
LLVM logo
LLVM
Git logo
Git
Github logo
Github
GNU logo
GNU
Shell logo
Shell
Terminal logo
Terminal
Linux logo
Linux
WireGuard logo
WireGuard
Kali logo
Kali
Docker logo
Docker
Apple logo
Apple
Python logo
Python
PyTorch logo
PyTorch
Vanguard logo
Vanguard
CloudFlare logo
CloudFlare
Git logo
Git
Github logo
Github
GNU logo
GNU
Shell logo
Shell
Terminal logo
Terminal
Linux logo
Linux
WireGuard logo
WireGuard
Kali logo
Kali
Docker logo
Docker
Apple logo
Apple
Python logo
Python
PyTorch logo
PyTorch
Vanguard logo
Vanguard
CloudFlare logo
CloudFlare
Git logo
Git
Github logo
Github
GNU logo
GNU
Shell logo
Shell
Terminal logo
Terminal
Linux logo
Linux
WireGuard logo
WireGuard
Kali logo
Kali
Docker logo
Docker
Apple logo
Apple
Python logo
Python
PyTorch logo
PyTorch
Vanguard logo
Vanguard
CloudFlare logo
CloudFlare
Git logo
Git
Github logo
Github
GNU logo
GNU
Shell logo
Shell
Terminal logo
Terminal
Linux logo
Linux
WireGuard logo
WireGuard
Kali logo
Kali
Docker logo
Docker
Apple logo
Apple
Python logo
Python
PyTorch logo
PyTorch
Vanguard logo
Vanguard
CloudFlare logo
CloudFlare

Latset Projects

UnknownProjectByMe

An educational purposes only kernel cheating project.

  • Personal, free red-team anti-cheat project targeting the Windows kernel
  • Independent exploration of kernel-level offense and defense techniques
  • Focused on learning kernel adversarial interactions and preventative security measures
  • Never used in live multiplayer environments; strictly for research and educational purposes
  • Gained extensive insights into defending against kernel-level threats and bypasses
Windows Kernel Exploits
C++ and MSVC
IDA Pro
SafetyHook

Testimonials

Initial Kernel Exploit Research

4.7Jun 2018 - Jul 2018

"Detailed analysis of kernel internals and proof-of-concept exploit against memory corruption vectors."

Upwork Company

Firmware Reverse Engineering Engagement

4.8Nov 2019 - Jan 2020

"Revealed hidden backdoors and developed remediation plan for critical embedded device firmware."

Upwork Company

Initial Kernel Exploit Research

4.7Jun 2018 - Jul 2018

"Detailed analysis of kernel internals and proof-of-concept exploit against memory corruption vectors."

Upwork Company

Firmware Reverse Engineering Engagement

4.8Nov 2019 - Jan 2020

"Revealed hidden backdoors and developed remediation plan for critical embedded device firmware."

Upwork Company

Initial Kernel Exploit Research

4.7Jun 2018 - Jul 2018

"Detailed analysis of kernel internals and proof-of-concept exploit against memory corruption vectors."

Upwork Company

Firmware Reverse Engineering Engagement

4.8Nov 2019 - Jan 2020

"Revealed hidden backdoors and developed remediation plan for critical embedded device firmware."

Upwork Company

Initial Kernel Exploit Research

4.7Jun 2018 - Jul 2018

"Detailed analysis of kernel internals and proof-of-concept exploit against memory corruption vectors."

Upwork Company

Firmware Reverse Engineering Engagement

4.8Nov 2019 - Jan 2020

"Revealed hidden backdoors and developed remediation plan for critical embedded device firmware."

Upwork Company

Custom Binary Protection Framework

5.0Aug 2021 - Sep 2021

"Architected and implemented an obfuscation layer that resisted automated unpacking and symbol recovery."

Upwork Company

Multi-Stage PoC Exploit Development

4.9Feb 2023 - Mar 2023

"Chained multiple vulnerabilities into a reliable end-to-end breach demonstration for proactive defenses."

Upwork Company

Advanced Cryptographic Scheme Audit

5.0Apr 2024 - May 2024

"Identified edge-case weaknesses and provided comprehensive mitigation strategies for custom ciphers."

Upwork Company

Custom Binary Protection Framework

5.0Aug 2021 - Sep 2021

"Architected and implemented an obfuscation layer that resisted automated unpacking and symbol recovery."

Upwork Company

Multi-Stage PoC Exploit Development

4.9Feb 2023 - Mar 2023

"Chained multiple vulnerabilities into a reliable end-to-end breach demonstration for proactive defenses."

Upwork Company

Advanced Cryptographic Scheme Audit

5.0Apr 2024 - May 2024

"Identified edge-case weaknesses and provided comprehensive mitigation strategies for custom ciphers."

Upwork Company

Custom Binary Protection Framework

5.0Aug 2021 - Sep 2021

"Architected and implemented an obfuscation layer that resisted automated unpacking and symbol recovery."

Upwork Company

Multi-Stage PoC Exploit Development

4.9Feb 2023 - Mar 2023

"Chained multiple vulnerabilities into a reliable end-to-end breach demonstration for proactive defenses."

Upwork Company

Advanced Cryptographic Scheme Audit

5.0Apr 2024 - May 2024

"Identified edge-case weaknesses and provided comprehensive mitigation strategies for custom ciphers."

Upwork Company

Custom Binary Protection Framework

5.0Aug 2021 - Sep 2021

"Architected and implemented an obfuscation layer that resisted automated unpacking and symbol recovery."

Upwork Company

Multi-Stage PoC Exploit Development

4.9Feb 2023 - Mar 2023

"Chained multiple vulnerabilities into a reliable end-to-end breach demonstration for proactive defenses."

Upwork Company

Advanced Cryptographic Scheme Audit

5.0Apr 2024 - May 2024

"Identified edge-case weaknesses and provided comprehensive mitigation strategies for custom ciphers."

Upwork Company

Recent Blog