Cybersecurity Engineer • Offensive Security • Reverse Engineering • Developer
I specialize in uncovering systemic weaknesses that traditional security teams overlook.
My focus is offensive security, exploit development, and deep analysis of software and network vulnerabilities.
I do not rely on academic validation — I rely on measurable results in the field.
If a system is secure, I leave it untouched.
If a system fails under pressure, I document, disclose responsibly, and move on.
| Category | Count |
|---|---|
| CVE Contributions | 61 |
| Confirmed Breaches / Full Intrusions | 16 |
| Custom Exploits Developed | 43 |
Every number represents real systems and real software — not theory.
• Kernel-level anti-cheat bypass architecture
• Advanced sandbox evasion for malware analysis
• Distributed server orchestration for MMORPG scaling
MMORPG private server re-implementation of NosTale with a dedicated MacOS client build and modern scalable infrastructure.
Game Server: .NET 8, gRPC, RabbitMQ, ELK, PostgreSQL, MongoDB
DevOps: Kubernetes, Docker, GitLab CI, ElasticSearch, Prometheus, K3s
Internal Software: Python, .NET Core, C++, PowerShell
Web: Vue.js (frontend), Ruby on Rails (backend), Laravel
Client SDK: C++, ASM
Resource Modding: C#, Golang, C++

