Offensive Security Engineer / Vulnerability Researcher
"Automating the offensive. Researching the undiscovered."
Memory corruption vulnerability within the pwdrvio.sys kernel driver of MiniTool Partition Wizard. Allows unprivileged attacker to achieve SYSTEM privileges through an arbitrary…
Project Date : Feb 2026 / Discovered a buffer overflow vulnerability in the IOCTL handler of the pwdrvio.sys kernel driver. The vulnerability…
Independent plugin: streams files into mounted VeraCrypt volumes and securely overwrites originals (unofficial). Implements military-grade wiping algorithms (DoD 5220.22-M, Gutmann) validated against…
Analyzed August and September 2025 Windows security patches via MSU/CAB extraction, hash comparison, Ghidra Version Tracking, and BinDiff. Built a Crash-only PoC…
Built a VM-based network tunnel forwarding host traffic through Tor with DNS-leak protection and adblock features. Validated isolation and performance for security…
AI-orchestrated cyber intelligence platform using 70B+ parameter local LLM agents for vulnerability verification and analysis automation. Runs entirely air-gapped — zero cloud…
Offensive Security Engineer and Systems Developer specializing in low-level vulnerability research, reverse engineering, and exploit development. With a strong foundation in C/C++ and systems architecture, I focus on dissecting complex environments—from Windows Kernel drivers to cryptographic software—to discover zero-day vulnerabilities and develop precise proof-of-concepts. I am deeply passionate about pushing the boundaries of offensive security, combining my engineering background with autonomous security tooling to uncover critical flaws at the core of operating systems and applications.
Available for remote or on-site roles. Relocation is not a problem.