I'm a 3rd-year Computer Science student at MIT who geeks out over low-level exploitation, reverse engineering, and building tools that make the internet a safer (or more dangerous) place.
When I'm not buried in disassemblers or debugging segfaults, I'm competing in Capture The Flag competitions with my team Shellphish, ranked #12 globally on CTFtime.
I believe the best way to secure systems is to understand how to break them. Every exploit teaches a lesson in defense.
Platforms
An automated shellcode generator & encoder that bypasses common NX/ASLR protections. Supports x86/x64, ARM architectures with polymorphic encoding.
Interactive heap visualization tool for understanding glibc malloc exploitation. Step through allocations, frees, and watch the heap state change in real-time.
Educational cryptography toolkit implementing attacks on weak RSA, AES side-channels, and common misconfigurations. Built for CTF training.
Discord bot that auto-posts CVEs, tracks CTF competitions, and manages team challenge distribution for Shellphish's internal workflow.
Clean, documented proof-of-concept implementations of Spectre v1 & v2 vulnerabilities. Used in my university's OS security course as teaching material.
Whether it's a CTF collaboration, security research, or just geeking out about low-level exploitation — I'm always down to connect. Drop me a message.