Projects

A curated list of offensive security work and applied security research.

Offensive Security

Mobile Application Security Testing Automator

Automation tool for Android and iOS testing with repeatable static checks and runtime probes. Produces a quick triage bundle that guides deeper manual work.

FridaPythonMobile App SecurityAutomation

Analysis of Return Oriented Programming (ROP)

Study of ROP gadget discovery tools and automation workflows. Reviewed common defenses and where automation tends to break down.

Exploit DevelopmentROPReverse Engineering

Memory Corruption Vulnerabilities

Hands on labs covering memory corruption primitives and exploitation basics. Practiced stack, heap and format string cases with ret2libc.

CExploit DevBinary Exploitation

Shellshock Vulnerability: Implementation and Remediation Techniques

Recreated Shellshock in a controlled lab and tested common remediation steps. Extended the setup using SEED Labs and a malicious DHCP scenario.

LinuxSEED LabsVulnerability Research

Security Research

Strangers Sets: Preserving Drones' Location Privacy while Avoiding Violations of Critical Infrastructures

Thesis project on checking restricted zone violations without revealing the drone location. Uses private set intersection to detect a violation while keeping both sides private.

Privacy-preserving protocolsPSIApplied cryptography

QSS-Based Keyless Titanium Secure (TitaniumSec) Email Application

Research internship project that delivered a keyless secure email web app using quasigroups and secret sharing. Covered design, implementation and evaluation with a small team.

C++JavaPythonPHPWeb

Secure Cloud Backup using Secret Sharing Schemes

Cloud backup prototype using secret sharing for confidentiality and resilience. Includes small demonstrations to explain secret sharing and JPEG steganography with simple threat models.

GoSecret SharingCloud SecuritySteganography

Understanding Privacy Risks on Android

Short research review on data collection behavior in Android apps and user impact. Connected findings to consent patterns and privacy regulation.

Mobile PrivacyAndroidGDPR

Privacy-Preserving Matching & Encrypted Analytics

Prototypes for matching and analytics on protected data. Implemented license plate matching and document similarity without exposing the raw values. Explored homomorphic encryption and practical performance tradeoffs.

Applied CryptographyHomomorphic EncryptionEncrypted Matching