Security Researcher Reverse Engineer Binary Exploiter

Siddharthan T V

Reverse engineer specializing in x86/x64 Linux binaries, exploit development, and low-level system analysis.

Security Focused
Low-Level Expert
Hero Image
Scroll to explore

About Me

A passionate security researcher dedicated to understanding systems at their core
and making the digital world safer.

I primarily work on ELF binaries in userland Linux environments, focusing on reverse engineering, vulnerability discovery, and exploit development. My work involves analyzing compiled code at the assembly level, understanding program control flow, and identifying security flaws that emerge from memory corruption and unsafe assumptions.

I routinely deal with x86/x64 binaries, studying how modern exploit mitigations such as ASLR, NX, PIE, and stack canaries are implemented and how they fail in real-world programs. My analysis process combines static reverse engineering with dynamic debugging to trace execution paths, inspect memory layouts, and reason about program behavior under different constraints.

Beyond exploitation, I’m deeply interested in system internals — how binaries are loaded, how processes interact with the kernel, and how low-level design decisions impact security. I build tooling and experimental systems to better understand these layers, rather than relying solely on black-box techniques.

I focus on clarity over automation, preferring manual analysis where it provides deeper insight. My goal is not just to trigger vulnerabilities, but to understand why they exist and how they can be prevented.

Reverse Engineering

Decompiling and analyzing software to understand its inner workings

Binary Exploitation

Identifying and exploiting vulnerabilities in compiled programs

Low-Level Analysis

Working with assembly, memory layouts, and system internals

Security Research

Discovering and responsibly disclosing security vulnerabilities

Skills & Expertise

A comprehensive toolkit for security research and binary analysis

Reverse Engineering

IDA Pro Ghidra Binary Ninja x64dbg Radare2 OllyDbg

Binary Exploitation

Buffer Overflow ROP Chains Heap Exploitation Format Strings Shellcoding ASLR/DEP Bypass

Programming

Python C/C++ ASM (x86/x64/ARM) Rust JavaScript Bash Scripting Go C#

Security Tools

Burp Suite Wireshark Metasploit GDB/PEDA AFL Fuzzer Volatility
certifications.sh
# Platforms
HackTheBox
TryHackMe
CTFtime
# OS Expertise
Linux
Windows
Embedded
# Architectures
x86/x64
ARM/ARM64
MIPS
# Focus Areas
Pwn/Binary
Reversing
Malware

Featured Projects

Security tools and research projects I've developed

FlucidOS

A minimal, Linux based operating system built from scratch

C Linux Bash Scripting Systemd GNU Core-Utils

Flappy

A binary package manager for FlucidOS to manage and distribute software packages.

C libcurl libsqlite3 libarchive libssl

Flurecon

An implementation of passive network reconnaissance tool in Rust Programming Language

Rust IEEE OUI Etherparse

Computer Vision Model

An implementation of a simple hand-gestures recognizing model in Python

Python OpenCV MediaPipe TensorFlow Flask

Experience

My journey through security research, open-source development, and systems engineering

B.E. Computer Science Engineering (AI & ML)

Sri Venkateswaraa College of Technology, Anna University
2024 – 2028

First-year student pursuing a BE in CSE with specialization in AI & ML at SVCT, Sriperumbudur. Actively building systems-level projects alongside coursework — including FlucidOS (a custom Linux distribution) and Flurecon (a network threat detection engine) — while targeting systems internships and open-source contributions.

Systems Programming Linux AI & ML Open Source

Get In Touch

Let's discuss security research, collaboration opportunities, or just connect

Email
GitHub
LinkedIn
Resume