███████╗ █████╗ █████╗ ██╗████████╗ █████╗ █████╗ ███╗ ███╗ █████╗ █████╗ ██╔════╝██╔══██╗██╔══██╗██║╚══██╔══╝██╔══██╗██╔══██╗████╗ ████║██╔══██╗██╔══██╗ ███████╗███████║███████║██║ ██║ ███████║███████║██╔████╔██║███████║███████║ ╚════██║██╔══██║██╔══██║██║ ██║ ██╔══██║██╔══██║██║╚██╔╝██║██╔══██║██╔══██║ ███████║██║ ██║██║ ██║██║ ██║ ██║ ██║██║ ██║██║ ╚═╝ ██║██║ ██║██║ ██║ ╚══════╝╚═╝ ╚═╝╚═╝ ╚═╝╚═╝ ╚═╝ ╚═╝ ╚═╝╚═╝ ╚═╝╚═╝ ╚═╝╚═╝ ╚═╝╚═╝ ╚═╝
╔═══
═══╗
╚═══
═══╝
╔════════════════════════════════════════════════╗
║ ABOUT ME ║
╚════════════════════════════════════════════════╝
>> Security engineer with hands-on SOC operations experience in threat detection, incident response, and enterprise infrastructure defense. Actively conducting security research across multiple domains...
╔════════════════════════════════════════════════╗
║ RESEARCH & ARTICLES ║
╚════════════════════════════════════════════════╝
╔═════════════════════╗
Malware Analysis
║ Dissecting Conti's Ransomware Encryption
📅 2025
║ Deep dive analysis of Conti ransomware's encryption mechanisms, key derivation processes, and attack chain.
╚═════════════════════╝
[read more →]
╔═════════════════════╗
Reverse Engineering
║ Malware 101: Anti-Virtualization & Anti-Debugging
📅 2024
║ Comprehensive guide on malware evasion techniques including VM detection, debugger detection.
╚═════════════════════╝
[read more →]
╔═════════════════════╗
Malware Development
║ EtherHiding: Storing Malware on the Blockchain
📅 2025
║ POC malware that leverages blockchain technology (Ethereum) to store and retrieve shellcode.
╚═════════════════════╝
[read more →]
╔═════════════════════╗
Vulnerability Research
║ OOB Write in qemu Aspeed ADC Emulation
📅 2026
║ First Vulnerability found with manual auditing
╚═════════════════════╝
[read more →]
╔════════════════════════════════════════════════╗
║ CONTACT ║
╚════════════════════════════════════════════════╝
Let's talk about security research!