Skip to content
View x-raen's full-sized avatar

Block or report x-raen

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
x-raen/README.md

πŸ‘¨β€πŸ’» x-raen | Cybersecurity Researcher & Reverse Engineer

Security Researcher Reverse Engineer Exploit Developer

πŸ” About Me

Cybersecurity Researcher specializing in Reverse Engineering and exploit development. I work on analyzing and developing advanced techniques in embedded systems security and low-level software.


πŸ› οΈ Technical Skills

Domain Skills
Programming Languages Python, C/C++, Assembly, JavaScript
Analysis Tools IDA Pro, Ghidra, Radare2, Binary Ninja
Exploitation Techniques ROP/JOP Chains, Shellcode Development, Firmware Analysis
Operating Systems Linux, Windows, Embedded Systems

πŸš€ Featured Projects

Advanced engine for intelligently transforming ROP/JOP chains across different firmware versions and environments.

Professional toolkit for binary analysis and automated extraction of ROP/JOP gadget maps.


πŸ“Š GitHub Stats

GitHub Stats


πŸ“« Contact Me

LinkedIn Twitter telegram

Pinned Loading

  1. psfree-lapse-toolkit psfree-lapse-toolkit Public

    Professional-grade tools for efficient binary analysis and automated ROP/JOP gadget map extraction, aimed at accelerating exploit development for PSFree Lapse and similar projects.

    Python 3

  2. echoshift-engine echoshift-engine Public

    Advanced toolkit for intelligent transformation of ROP/JOP exploit chains across different firmware versions using semantic analysis and symbolic execution.

    Python 3