- π 18 y/o student passionate about systems programming, reverse engineering, and security
- πΉοΈ Loves doing CTFs, especially pwn challenges (binary exploitation, memory corruption, reversing)
- π» Strong focus on Linux internals, Assembly, C, and Python
- π§© Curious about how things work under the hood
-π₯ 1st Place β CodeGuru Extreme (2026) National Cyber Competition (1st / 174 teams)
- Debugging:
gdb+pwndbg - Reverse Engineering: disassemblers, Ghidra
- Exploit Writing: pwntools
- Built in Python with sockets, threading, bitfield-based piece scheduling, and hybrid RSA+AES encryption
- Includes tracker + peers (both seeding & downloading)
- Supports multiple breakpoint types, instruction-level stepping, disassembly, ELF parsing, full CPU register inspection, and process memory inspection.
- Working on rewind execution feature based on Copy-On-Write memory snapshots, for tracking modified pages to efficiently restore previous execution states.
- A low-level game written in x86 Assembly, focusing on optimization, memory control, and graphics logic