Ömer Can
Ömer Can Vural

Offensive Security Engineer / Vulnerability Researcher

Windows Kernel Active Directory C/C++ Python Reverse Engineering Vuln Research Automation

"Automating the offensive. Researching the undiscovered."

★ Featured

CVE-2026-36981-Kernel-EoP-PoC

Memory corruption vulnerability within the pwdrvio.sys kernel driver of MiniTool Partition Wizard. Allows unprivileged attacker to achieve SYSTEM privileges through an arbitrary…

C Reverse Engineering Vulnerability Research Windows Kernel
Feb 2026 0 0
★ Featured

CVE-2026-36980-Kernel-BSOD-DoS-PoC

Project Date : Feb 2026 / Discovered a buffer overflow vulnerability in the IOCTL handler of the pwdrvio.sys kernel driver. The vulnerability…

Python Reverse Engineering Vulnerability Research Windows Kernel
Feb 2026 0 0
★ Featured

VERASER — Secure Delete Plugin for VeraCrypt

Independent plugin: streams files into mounted VeraCrypt volumes and securely overwrites originals (unofficial). Implements military-grade wiping algorithms (DoD 5220.22-M, Gutmann) validated against…

C C++ OpenSSL VeraCrypt
Oct 2025 7 2
★ Featured

CVE-2025-54110 Kernel EoP PoC

Analyzed August and September 2025 Windows security patches via MSU/CAB extraction, hash comparison, Ghidra Version Tracking, and BinDiff. Built a Crash-only PoC…

C Reverse Engineering Vulnerability Research Windows Kernel
Sep 2025 10 1
★ Featured

HiddenRoute — VM-based Anonymity Proxy

Built a VM-based network tunnel forwarding host traffic through Tor with DNS-leak protection and adblock features. Validated isolation and performance for security…

C++ Multithreading Qt VirtualBox COM
Jun 2025
★ Featured

ZAS — Vulnerability Analysis System

AI-orchestrated cyber intelligence platform using 70B+ parameter local LLM agents for vulnerability verification and analysis automation. Runs entirely air-gapped — zero cloud…

Python Local LLM n8n Automation
Jan 2025
Show All
Full Tracker
Patch Tuesday CVE releases — one dot = one day
Less More
Critical   High   Medium   Low   Source: MSRC Patch Tuesday · Updated 2026-05-10
Show All (23)

Offensive Security.
Built From the Ground Up.

Offensive Security Engineer and Systems Developer specializing in low-level vulnerability research, reverse engineering, and exploit development. With a strong foundation in C/C++ and systems architecture, I focus on dissecting complex environments—from Windows Kernel drivers to cryptographic software—to discover zero-day vulnerabilities and develop precise proof-of-concepts. I am deeply passionate about pushing the boundaries of offensive security, combining my engineering background with autonomous security tooling to uncover critical flaws at the core of operating systems and applications.

View Experience All Projects
0-Day
Research on Kernel Systems
N-Day
Patch Diffing
CVE
MITRE Reports
PoC
Public & Private
Windows Kernel Exploitation Active Directory Attacks Privilege Escalation (LPE) Vulnerability Discovery Exploit Development Web App Pentesting
Python (Scripting, Automation, Testing) Bash & PowerShell n8n Workflow Automation Local LLM Agents Virtualization (VBox, QEMU, VMware) Rapid7 Nexpose
C / C++ (CMake, gcc/g++, MSVC) Qt Framework OpenSSL Embedded Firmware (STM32) VHDL / FPGA Cross-Platform Development

Work History

KKB — Kredi Kayıt Bürosu
Vulnerability Assessment & Penetration Tester
İstanbul, Türkiye  ·  08/2023 – 05/2024
  • Designed and deployed a Python/Bash vulnerability triage system processing Nexpose/Nessus and Nmap outputs for 8,000+ hosts, automatically creating 300+ prioritized remediation tickets and reducing critical vulnerabilities by 90%.
  • Implemented PowerShell automation to apply CIS Benchmark configurations across 4,000+ Windows servers and endpoints.
  • Supported red team operations: Active Directory hardening, lateral movement validation, and APT simulations.
  • Performed 8+ web application and 3+ mobile application penetration tests (Burp Suite, Nikto, sqlmap, Frida for SSL Pinning Bypass).
Rapid7 Nexpose Nessus Python PowerShell Active Directory Penetration Testing Automation
Baykar Technology
Engineering Intern — Cybersecurity
İstanbul, Türkiye  ·  07/2023 – 08/2023
  • Developed plug-ins for internal cryptographic tools and security tooling suite in C/C++.
  • Conducted research on vulnerability impacts on enterprise services, documented cases and recommended mitigations.
C/C++ Cryptography Vulnerability Research
Z-Sistem Aviation & Informatics
Engineering Intern — Embedded Systems
Ankara, Türkiye  ·  10/2022 – 12/2022
  • Contributed to PX4 autopilot modules (C/C++, CMake) and developed a custom mission system with emergency handling.
  • Implemented MAVLink modules and QGroundControl integrations for reliable telemetry on mission profiles.
  • Validated all modules via Gazebo simulation.
C/C++ PX4 MAVLink QGroundControl Embedded Systems Gazebo

Certs & Achievements

Offensive Pentesting
TryHackMe
11/2025
Uygulamalı Sızma Testi
BTK Akademi
05/2023
CyberOps Associate
Cisco
04/2023
CCNAv7
Cisco
01/2023
Introduction to Cyber Security
Cisco
12/2022
NDG Linux Unhatched
Cisco
12/2022
Pardus Hata Yakalama Yarışması
Participated in the Pardus bug bounty program, reported security vulnerabilities in the national Linux distribution.

Get In Touch

Available for remote or on-site roles. Relocation is not a problem.