Cybersecurity Researcher specializing in Reverse Engineering and exploit development. I work on analyzing and developing advanced techniques in embedded systems security and low-level software.
| Domain | Skills |
|---|---|
| Programming Languages | Python, C/C++, Assembly, JavaScript |
| Analysis Tools | IDA Pro, Ghidra, Radare2, Binary Ninja |
| Exploitation Techniques | ROP/JOP Chains, Shellcode Development, Firmware Analysis |
| Operating Systems | Linux, Windows, Embedded Systems |
Advanced engine for intelligently transforming ROP/JOP chains across different firmware versions and environments.
Professional toolkit for binary analysis and automated extraction of ROP/JOP gadget maps.