Independent Security Researcher specialized in Reverse Engineering (RE). I sometimes do Vulnerability Research related to binaries, network protocols, hardware and IoT devices. I also do pwn in CTF Challenges when I have the time.
Independent Security Researcher specialized in Reverse Engineering (RE). I sometimes do Vulnerability Research related to binaries, network protocols, hardware and IoT devices. I also do pwn in CTF Challenges when I have the time.