I'm an InfoSec student from Germany with a passion for systems programming, OS and firmware security architecture including Trusted Computing concepts, reverse engineering, offensive security and malware research.
Projects and fields I have previously spent time with include:
-π’ Building secure system-level software in C for the Windows OS (user mode & kernel mode)
-π’ Building boot applications in C for the Unified Extensible Firmware Interface (UEFI)
-π’ Creating anti-reverse-engineering systems using code-virtualization concepts
-π’ Building web frontends using HTML, CSS, and JavaScript (including various third-party libraries)
-π’ Building secure web backends using PHP and MySQL
-π’ Building automation software in various programming languages such as Java and Python
-π’ Participating in various Capture-The-Flag (CTF) programs such as HackTheBox
-π’ Performing web hacking in simulated environments
-π’ Building Red Team offensive software for Windows
-π’ Implementing multiple proof-of-concepts for kernel mode rootkits and UEFI based bootkits
-π’ Low-level exploit development
-π’ Reverse engineering x86 based binaries and systems using tools such as IDA and Binary Ninja
-π’ Dynamic reverse engineering using the IDA Debugger, x64dbg, and WinDBG
-π’ Reverse engineering internal processes and modules of the Windows OS
-π’ Reverse engineering the Windows boot process and its various boot applications
-π’ Conducting vulnerability research on Windows and UEFI systems
-π’ Studying modern boot security and its flaws.
-π’ Studying TPM based security such as SRTM/DRTM based attestation (some of which I discuss in a more casual setting here)
-π’ Researching modern (hardware based) OS security mechanisms such as Virtualization Based Security (VBS)
-π’ Writing various scientific papers on the current state of UEFI and kernel mode threats and security measures