Specialized in reverse engineering, malware analysis, and kernel-level security research
I'm a dedicated reverse engineer and malware analyst with a passion for understanding how malicious software works at its core. My journey in cybersecurity has been driven by curiosity and a commitment to making systems more secure.
From analyzing password stealers and unpacking obfuscated binaries to diving deep into Linux kernel rootkits, I've developed a comprehensive skill set in static and dynamic analysis.
I also contribute to open-source kernel development, which deepens my understanding of OS internals and helps me better identify malicious system-level modifications.
Analyzed loadable kernel module rootkit that hides processes and files. Identified syscall table hooking mechanisms and developed detection scripts.
Deobfuscated multi-level PowerShell loader with Base64 encoding and string manipulation. Extracted IOCs and analyzed download behavior.
Manually unpacked UPX-protected binary using x64DBG. Successfully located OEP, dumped process, and reconstructed imports.
Analyzed browser password stealer targeting Chrome and Firefox. Documented API usage, behavior patterns, and generated IOCs.
Contributing to educational microkernel project. Implemented process scheduling, system calls, and memory management features.
Developed Python scripts for hash extraction, string analysis, and VM automation to streamline analysis workflows.