βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β whoami β
β βββββββββββββββββββββββββββββββββββββββββββββββββββ β
β > Security Researcher based in [REDACTED] β
β > Focus: Web Security / Binary Exploitation / Reverse β
β > CTF: n0xious@TeamVoid β
β > Bug Bounty: HackerOne / Bugcrowd β
β > Currently: Hunting for logic flaws & memory corruptionβ
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
I'm a self-taught security researcher with a focus on offensive security, vulnerability research, and reverse engineering. I play CTFs regularly with TeamVoid and occasionally disclose bugs through responsible disclosure programs.
Most of my work lives in the intersection of low-level exploitation and web application security. When I'm not breaking things, I'm writing about how they broke.
"Security is not a product, but a process." β Bruce Schneier
| Domain | Tools & Skills |
|---|---|
| π Web Security | Burp Suite, SQLMap, ffuf, nuclei, XSS/SSRF/IDOR |
| π£ Binary Exploitation | pwntools, GDB-peda, ROPgadget, heap feng shui |
| π Reverse Engineering | Ghidra, IDA Free, x64dbg, angr |
| π΅οΈ OSINT | Shodan, theHarvester, Maltego |
| π§ Privilege Escalation | Linux/Windows post-exploitation, custom scripts |
2024 ββ HITCON CTF β Top 5% (Web + Pwn)
2024 ββ NahamCon CTF β Top 10% (Web + Crypto)
2023 ββ picoCTF β Top 8% (All categories)
2023 ββ DEFCON CTF Quals β Qualified with TeamVoid
2023 ββ HackTheBox Uni CTF β 3rd Place