U-Boot Bootloader Exploitation
a critical 1-second attack window in embedded bootloaders enabling complete device compromise through serial interface manipulation.
Security Researcher & Penetration Tester
Specializing in malware analysis, reverse engineering, and adversary simulation. Currently hunting vulnerabilities and dissecting malware families.
Aitron
- Performed penetration testing on embedded systems and IoT devices, identifying vulnerabilities in firmware, hardware interfaces, and communication protocols.
- Designed and developed secure embedded hardware/software solutions with a focus on resilience against real-world cyberattacks.
HackTheBox
Active member solving challenges and contributing to the cybersecurity community
a critical 1-second attack window in embedded bootloaders enabling complete device compromise through serial interface manipulation.
a privilege escalation vulnerability in sudo chroot affecting Linux distributions worldwide.
Comprehensive analysis of modern malware families including Remcos RAT, AsyncRat, NetSupport, and AESRT Ransomware.
tcpdump-static-aarch64: ELF 64-bit LSB pie executable, ARM aarch64, version 1 (SYSV), static-pie linked, with debug_info, not stripped
strace: ELF 64-bit LSB executable, ARM aarch64, version 1 (GNU/Linux), statically linked, for GNU/Linux 3.7.0, with debug_info, not stripped