Siddharthan T V
Reverse engineer specializing in x86/x64 Linux binaries, exploit development, and low-level system analysis.
A passionate security researcher dedicated to understanding systems at their core
and making the digital world safer.
I primarily work on ELF binaries in userland Linux environments, focusing on reverse engineering, vulnerability discovery, and exploit development. My work involves analyzing compiled code at the assembly level, understanding program control flow, and identifying security flaws that emerge from memory corruption and unsafe assumptions.
I routinely deal with x86/x64 binaries, studying how modern exploit mitigations such as ASLR, NX, PIE, and stack canaries are implemented and how they fail in real-world programs. My analysis process combines static reverse engineering with dynamic debugging to trace execution paths, inspect memory layouts, and reason about program behavior under different constraints.
Beyond exploitation, I’m deeply interested in system internals — how binaries are loaded, how processes interact with the kernel, and how low-level design decisions impact security. I build tooling and experimental systems to better understand these layers, rather than relying solely on black-box techniques.
I focus on clarity over automation, preferring manual analysis where it provides deeper insight. My goal is not just to trigger vulnerabilities, but to understand why they exist and how they can be prevented.
Decompiling and analyzing software to understand its inner workings
Identifying and exploiting vulnerabilities in compiled programs
Working with assembly, memory layouts, and system internals
Discovering and responsibly disclosing security vulnerabilities
A comprehensive toolkit for security research and binary analysis
Security tools and research projects I've developed
My journey through security research, open-source development, and systems engineering
First-year student pursuing a BE in CSE with specialization in AI & ML at SVCT, Sriperumbudur. Actively building systems-level projects alongside coursework — including FlucidOS (a custom Linux distribution) and Flurecon (a network threat detection engine) — while targeting systems internships and open-source contributions.
Let's discuss security research, collaboration opportunities, or just connect