I am a specialized Threat Researcher bridging the gap between offensive security and low-level software engineering. With a strong foundation in C, C++, Assembly, and Python, I build custom offensive tools—including malware proof-of-concepts and advanced keyloggers—for targeted security engagements. My background includes rigorous Capture The Flag (CTF) experience, network scanning, and deep-dive malware analysis. I don’t just rely on automated scanners; I engineer tailored payloads and reverse-engineer threats to test system resilience at the architecture level. Whether you need bespoke security tool development, vulnerability research, or advanced threat analysis, I deliver deeply technical, code-driven results.