I'm an InfoSec student from Germany with a passion for systems programming, OS and firmware security architecture, reverse engineering, offensive security and malware research.
If you'd like to reach out, feel free to add me on Discord (never_unsealed)!
My past projects and focus areas include:
π’ Building system-level software for Windows (usermode & kernelmode)
π’ Building boot applications for the Unified Extensible Firmware Interface (UEFI)
π’ Building anti reverse engineering solutions based on code virtualization
π’ Building web front-ends using HTML, CSS, and JavaScript (including various frameworks)
π’ Building secure web back-ends using Rust and PHP
π’ Building automation software in various programming languages such as Java and Python
π’ Participating in Capture-The-Flag (CTF) programs such as HackTheBox
π’ Performing web hacking in simulated environments
π’ Building Red Team offensive software for Windows
π’ Implementing multiple proof-of-concepts for kernel mode rootkits and UEFI based bootkits
π’ Low-level exploit development
π’ Reverse engineering x86 based binaries and systems using tools such as IDA and Binary Ninja
π’ Dynamic reverse engineering using the IDA Debugger, x64dbg and WinDBG
π’ Reverse engineering internal mechanisms and modules of the Windows OS
π’ Reverse engineering the Windows boot process and its various boot applications
π’ Conducting vulnerability research on Windows and UEFI systems
π’ Studying modern boot security and its flaws
π’ Studying Trusted Computing (which I discuss in a more casual setting here)
π’ Researching modern (hardware based) OS security mechanisms such as Virtualization Based Security (VBS)
π’ Writing various scientific papers on the current state of UEFI and kernel mode threats and security measures
π’ Writing a Bachelor's thesis on the various approaches to code virtualization as a reverse engineering protection