About Me


I am an independent security researcher focused on malware analysis, offensive security research, and improving defensive measures. I investigate real-world threats, develop tooling and techniques for deep analysis, and responsibly disclose findings to affected vendors and communities. My work combines reverse engineering, dynamic analysis, and exploit development to better understand how modern threats operate.

My research interests and typical investigation areas include the following (examples):

  • Binary analysis and reverse engineering
  • Exploit development and memory corruption (heap/stack overflows, use-after-free)
  • Sandbox escape and VM/container breakout techniques
  • Persistence mechanisms and stealth/rootkit techniques
  • Fuzzing and automated vulnerability discovery
  • Obfuscation, packing, and anti-analysis techniques
  • Network-based malware behavior and lateral movement
  • Platform-specific threats (Windows, Linux, macOS, mobile, IoT)
  • Supply-chain and firmware compromise analysis

I follow responsible disclosure practices and collaborate with vendors and CERTs to reduce risk and improve defenses. I also publish tooling, writeups, and practical guides to help defenders and researchers learn from real incidents.

Certifications