Available for opportunities

DEVNULL

⚡ Shellphish 🏆 #12 Global 🚩 47 Wins
Scroll
Python C / C++ x86 Assembly Reverse Engineering Binary Exploitation Rust Web Security Cryptography Linux Ghidra GDB Wireshark Python C / C++ x86 Assembly Reverse Engineering Binary Exploitation Rust Web Security Cryptography Linux Ghidra GDB Wireshark
01 // ABOUT

whoami

devnull@kali:~
$ cat about.txt
Name: Alex Chen
Alias: DevNull
Role: CS Student @ MIT
Year: Junior (3rd)
Focus: Security & Systems

$ cat interests.txt
→ Binary exploitation & pwning
→ Reverse engineering malware
→ Building offensive security tools
→ Competitive CTFs
→ Low-level systems programming

$ echo $STATUS
# Currently pwnning everything 🔥
$

I'm a 3rd-year Computer Science student at MIT who geeks out over low-level exploitation, reverse engineering, and building tools that make the internet a safer (or more dangerous) place.

When I'm not buried in disassemblers or debugging segfaults, I'm competing in Capture The Flag competitions with my team Shellphish, ranked #12 globally on CTFtime.

I believe the best way to secure systems is to understand how to break them. Every exploit teaches a lesson in defense.

0
CTF Wins
0
Challenges
0
Projects
02 // SKILLS

Arsenal

Languages

C / C++ 95%
Python 90%
x86 / ARM Assembly 85%
JavaScript / TypeScript 80%
Rust 75%
Go 70%

🛡️ Security & Tools

Binary Exploitation (pwn) 92%
Reverse Engineering 88%
Web Exploitation 82%
Cryptography 78%
Forensics 75%
GDB Ghidra IDA Pro pwntools Burp Suite Wireshark Radare2 Binary Ninja Docker Linux Git Vim btw
03 // CTF

Capture The Flag

ctf_log.sh
#!/bin/bash
# Recent CTF Activity Log

[2024] DEF CON CTF Finals
└─ Placed 5th with Shellphish
└─ Solved 3/8 pwn challenges
└─ First blood on "heap_heaven"

[2024] Google CTF
└─ Top 20 finish
└─ Solved sandbox escape challenge

[2024] PicoCTF
└─ 1st Place (Individual)
└─ 950/950 points

[2023] SECCON CTF
└─ 3rd Place International
└─ Solved all web challenges

[2023] PlaidCTF
└─ 7th Place with PPP
└─ Authored 2 writeups

$ echo "more writeups at blog.devnull.io"
more writeups at blog.devnull.io
$
🏴
0
CTFs Competed
🥇
0
Top 10 Finishes
🔓
0
Flags Captured
📝
0
Writeups Published

Platforms

pwnable.kr HackTheBox CTFtime OverTheWire pwn.college Crackmes.one
04 // PROJECTS

Builds

💀

ShellWeaver

An automated shellcode generator & encoder that bypasses common NX/ASLR protections. Supports x86/x64, ARM architectures with polymorphic encoding.

C x86 ASM Python Security
🔍

HeapViz

Interactive heap visualization tool for understanding glibc malloc exploitation. Step through allocations, frees, and watch the heap state change in real-time.

Python JavaScript D3.js pwntools
🕸️

CryptoForge

Educational cryptography toolkit implementing attacks on weak RSA, AES side-channels, and common misconfigurations. Built for CTF training.

Python SageMath Cryptography
🤖

VulnBot

Discord bot that auto-posts CVEs, tracks CTF competitions, and manages team challenge distribution for Shellphish's internal workflow.

Python Discord.py PostgreSQL Docker
🔬

Spectre-POC

Clean, documented proof-of-concept implementations of Spectre v1 & v2 vulnerabilities. Used in my university's OS security course as teaching material.

C x86 ASM CPU Architecture
📡

NetWatch

Real-time network traffic analyzer with anomaly detection using ML. Identifies suspicious patterns, C2 beacons, and exfiltration attempts on local networks.

Rust Python Scapy ML
05 // JOURNEY

Timeline

2024
🔥 Security Research Intern @ Google Project Zero
Working on vulnerability research in Chrome's V8 JavaScript engine. Discovered and reported 3 CVEs during the internship. Published internal tooling for fuzzing JIT compilers.
2024
🏆 DEF CON CTF Finalist
Competed with Shellphish at DEF CON 32 in Las Vegas. Placed 5th globally. First blood on the hardest heap exploitation challenge.
2023
🎯 Joined Shellphish CTF Team
Recruited to one of the world's top CTF teams. Specializing in pwn and reverse engineering categories. Contributing to team tooling infrastructure.
2023
🎓 Started at MIT — CS Major
Began studying Computer Science with a focus on systems and security. Taking courses in operating systems, compilers, and cryptography.
2022
🚀 First CTF — PicoCTF
Competed in my first CTF and placed in the top 100. Got hooked on binary exploitation and never looked back. Started my writeup blog.
2021
💡 The Beginning
Wrote my first "Hello World" in C. Accidentally discovered buffer overflows. Spent the next year reading "Hacking: The Art of Exploitation". Life changed.
06 // CONTACT

Ping Me

Let's break something together.

Whether it's a CTF collaboration, security research, or just geeking out about low-level exploitation — I'm always down to connect. Drop me a message.