I'm pursuing a career in joint cybersecurity cybersecurity and software engineeringsoftware engineering endeavours. - and with certificates in C and C++ software development from Dartmouth University, Institut Mines-Telecom, and LinkedIn Learning, I am always looking to learn about new and interesting technology! Some of my notable and publicly-disclosed vulnerabilities are maintained on a subdomain, using a custom-made system.
Some of my interests have resulted in open-source projects being released via GitHub:
A full-stack system for storing and reviewing sensitive vulnerabilities with encrypted reports stored on a peer-to-peer network and decryption taking place in the client's browser.
A cross-platform SOCKS4(a)/SOCKS5(h) proxy with integrated Lua plugin support that allows users to extend the core functionality to suit specialized needs.
A Windows tool for use in triaging and identifying DLL sideloading/hijacking vulnerabilities in running processes by hooking relevant functions at runtime.
A performant, secure C++ library which leverages the boost.asio framework to deliver an object-oriented networking model that can easily be used by other programs. This project was written in C++ (17/20) and is actively being used in another personal project.
A simplistic UI-driven interpreter of a limited ARM subset. Written in C++ using the Qt Framework and designed with future modularity in mind, making additions to the instruction-set extremely simple.
A Windows tool for monitoring websites for source-level changes in content, this project is configurable via regular expressions, timeouts, custom user-agents, and exportable (encrypted) configuration files. Written in C# using the .NET framework and WinForms for the user-interface.
A command-line application that allows users to explore the internals of PNG image files and their comprising chunks. Written in modern C and thoroughly tested using fuzzing (AFL-Fuzz) and a code assurance platform (Codacy).
A Python script that enumerates over files or directories, printing the imports of all executables that it finds. A good use-case for this script is to have a large directory of drivers which the script would then scan for interesting API imports.