Recent

Analyzing CTF Binaries with Reverse Engineering and Symbolic Execution
·1 min
Analyzed 32-bit Linux CTF binaries using Ghidra, GDB, and angr to reverse-engineer program logic, identify key execution paths, and recover hidden flags through symbolic execution.

Hardening C Applications Against Memory Safety Exploits
·1 min
Strengthened the security of C applications by identifying and resolving memory-safety vulnerabilities using Clang’s AddressSanitizer, static analysis, and regression testing.

Designing Resilient Network Architecture for Haven Health
·1 min
Architected a secure, scalable network for a healthcare provider, emphasizing HIPAA compliance and multi-site connectivity.
