Featured builds, research prototypes, and everything in between. Click any card to view on GitHub.
FEATURED
Semantic fuzzing framework targeting the Linux kernel's network stack for race conditions — part of the OSIRIS Lab research initiative. Custom Go-based corpus generation and race condition detection heuristics.
View on GitHub →Kernel-level security enhancements to the xv6 OS — ASLR, W^X memory policies, stack canaries, process isolation, and custom system calls for security auditing. Built on the Lind sandbox research at NYU.
View on GitHub →PGD adversarial training on MNIST, validating Madry et al. (2018) — achieving ~90% accuracy against PGD/FGSM attacks. Identified weaknesses under C&W attacks. Re-engineered TensorFlow 1.x → 2.x for CleverHans and ART.
View on GitHub →A fully functional CHIP-8 emulator from scratch — all 35 opcodes, 64×32 pixel XOR-based sprite rendering, SDL2 graphics and input, proper timing with delay/sound timers, and 16-key hexadecimal keypad.
View on GitHub →A CLI tool to quickly scan binaries and applications for common vulnerability classes — weak permissions, outdated libraries, CVE matches, and ROP gadget detection. Designed for CTF and real-world assessments.
View on GitHub →OS-level security research using Rust, contributing to the Lind sandbox project — a restricted POSIX environment to safely execute untrusted code via WebAssembly. Part of NYU Tandon systems security research.
View on GitHub →MORE WORK
Co-ran one of the world's largest student-run cybersecurity competitions — challenge hosting, platform maintenance, moderation at scale across dozens of global regions.
View Profile →Documented solutions and methodology for OverTheWire Bandit and Natas wargame challenges — covering Linux privilege escalation, web exploitation, and crypto fundamentals.
View on GitHub →Edit projects.html to add your next build here
Edit projects.html to add your next build here
Edit projects.html to add your next build here
Edit projects.html to add your next build here