Recent

An Empirical Evaluation of Suricata for Protecting Vulnerable Web Application Servers ↗ ↖
Evaluated Suricata as a network-based intrusion detection system by testing its ability to detect real-world attacks against a vulnerable web application in a controlled lab environment.

Analyzing CTF Binaries with Reverse Engineering and Symbolic Execution
·1 min
Analyzed 32-bit Linux CTF binaries using Ghidra, GDB, and angr to reverse-engineer program logic, explore execution paths, and recover hidden flags via symbolic execution.

Hardening C Applications Against Memory Safety Exploits
·1 min
Strengthened the security of C applications by identifying and resolving memory-safety vulnerabilities using Clang’s AddressSanitizer, static analysis, and regression testing.
