I'm pursuing a career in joint cybersecurity
cybersecurity and software engineeringsoftware engineering endeavours.
- and with certificates in C and C++ software development from Dartmouth University,
Institut Mines-Telecom, and LinkedIn Learning,
I am always looking to learn about new and interesting technology!
Some of my notable and publicly-disclosed vulnerabilities are maintained on a
subdomain, using a custom-made system.
Some of my interests have resulted in open-source projects being released via GitHub:
A full-stack system for storing and reviewing sensitive vulnerabilities with encrypted reports
stored on a peer-to-peer network and decryption taking place in the client's browser.
A cross-platform SOCKS4(a)/SOCKS5(h) proxy with integrated Lua plugin support
that allows users to extend the core functionality to suit specialized needs.
A Windows tool for use in triaging and identifying DLL sideloading/hijacking vulnerabilities in running processes by
hooking relevant functions at runtime.
A performant, secure C++ library which leverages the boost.asio framework
to deliver an object-oriented networking model that can easily be used by
other programs. This project was written in C++ (17/20) and is actively being used
in another personal project.
A simplistic UI-driven interpreter of a limited ARM subset.
Written in C++ using the Qt Framework and designed with future
modularity in mind, making additions to the instruction-set extremely simple.
A Windows tool for monitoring websites for source-level changes
in content, this project is configurable via regular expressions,
timeouts, custom user-agents, and exportable (encrypted) configuration files.
Written in C# using the .NET framework and WinForms for the user-interface.
A command-line application that allows users to explore the internals
of PNG image files and their comprising chunks. Written in modern C and
thoroughly tested using fuzzing (AFL-Fuzz) and a code assurance platform (Codacy).
A Python script that enumerates over files or directories, printing the imports
of all executables that it finds. A good use-case for this script is to have a large
directory of drivers which the script would then scan for interesting API imports.