Expert security researcher and systems engineer with deep specialization in reverse engineering, offensive security, and malware development. Creator of the award-winning 'Ponce' IDA Pro plugin, demonstrating exceptional proficiency in C/C++, symbolic execution, and modern cross-platform build systems.
Score Context: This score reflects a highly skilled specialist capable of delivering production-grade security tools. The developer combines deep research capabilities with strong engineering discipline, making them effective at both innovation and implementation.
IDA 2016 plugin contest winner! Symbolic Execution just one-click away!
Multi-platform, statically compiled SSH server and client malware
Projects like 'Ponce' and 'Cid-SSH' feature gold-standard docs with theoretical explanations, installation steps, and usage GIFs.
Leverages advanced tooling (vcpkg, GitHub Actions) to ensure portability across Windows, Linux, and OSX.
Demonstrates high standards with type hinting in Python and modular architecture in C++, though some hard system dependencies exist.
While CI ensures builds pass, there is a lack of visible regression testing or unit tests for the complex core logic.
Architected complex, cross-platform tools like 'Ponce' and 'Cid-SSH' using modern standards, static compilation, and modular design.
Created 'Ponce', a contest-winning IDA plugin implementing advanced symbolic execution and taint analysis logic.
Developed sophisticated malware tooling including custom SSH servers and credential stealers, plus functional CVE exploits.
Consistently implements robust cross-platform build systems (vcpkg, CMake, GitHub Actions) to solve complex dependency management.
Writes clean, type-hinted scripts for complex exploit chains and automation, as seen in the SAML vulnerability PoC.
Get docs, diagrams, scorecards, and reviews for any repository. Understand code faster.