██████╗ ███╗ ██╗███████╗██████╗ ██████╗ ██╗ █████╗ ███╗ ███╗███████╗ ██╔═══██╗████╗ ██║██╔════╝╚════██╗██╔══██╗██║ ██╔══██╗████╗ ████║██╔════╝ ██║ ██║██╔██╗ ██║█████╗ █████╔╝██████╔╝██║ ███████║██╔████╔██║█████╗ ██║ ██║██║╚██╗██║██╔══╝ ██╔═══╝ ██╔══██╗██║ ██╔══██║██║╚██╔╝██║██╔══╝ ╚██████╔╝██║ ╚████║███████╗███████╗██████╔╝███████╗██║ ██║██║ ╚═╝ ██║███████╗ ╚═════╝ ╚═╝ ╚═══╝╚══════╝╚══════╝╚═════╝ ╚══════╝╚═╝ ╚═╝╚═╝ ╚═╝╚══════╝ ~ Grok ~ The Dark Arts ~ Computer Networks ~ glibc Heap Exploitation ~ Web Application Security ~ Reverse Engineering Malware ~ Machine Learning for Trading ~ Software Analysis and Testing ~ Data Structures and Algorithms ~ Projects ~ MapReduce ~ splintershell ~ Distributed File System ~ Socials ~ GitHub ~ LeetCode ~ LinkedIn ~ Résumé ~ Contact