Security Researcher | Reverse Engineer | Penetration Tester I break complex systems across web, mobile, APIs, and native code to understand how they fail, how they can be exploited, and how to secure them properly.
- Security Research & Vulnerability Discovery Identifying logic flaws, design weaknesses, and implementation bugs through deep manual testing and code-level analysis.
- Reverse Engineering Analyzing Java, Smali, and native binaries to reconstruct application logic, bypass security controls, and understand defensive mechanisms.
- Web, API, and Mobile Penetration Testing Attacking real-world applications end to end — from client-side behavior to backend services and infrastructure.
- Exploit Reasoning & Proof of Impact Turning bugs into concrete, reproducible impact scenarios backed by technical evidence.
- Security Documentation & Responsible Disclosure Writing clear, technical reports that engineers and security teams can actually act on.
- Application logic abuse and authorization flaws
- Reverse engineering and bytecode-level analysis
- Native code inspection and runtime behavior analysis
- API and backend security testing
- Defense bypass techniques and security hardening
- Web, API, and mobile application security
- Reverse engineering and static analysis
- Dynamic analysis and runtime instrumentation
- Native code, JNI, and low-level execution paths
- Security research methodology and exploit development
Security isn’t about tools. It’s about understanding systems well enough to break them intentionally.