pub struct Engineer {
name: &'static str,
location: &'static str,
focus: [&'static str; 3],
stack: [&'static str; 4],
}
const ME: Engineer = Engineer {
name: "R16008882",
location: "Marseille, France 🇫🇷",
focus: ["Firmware RE", "Rust/Wasm Security Tooling", "AI Inference Pipelines"],
stack: ["Rust", "Python", "C++", "WebAssembly"],
};Firmware & Binary Analysis
- Static/dynamic analysis of embedded firmware (ARM, MIPS, x86)
- Binary diffing, vulnerability research, CVE reproduction
- Digital twin pipeline construction from RE'd firmware
Rust Security Tooling
- Low-level tooling & plugins compiled to Wasm for portability
- Memory-safe exploit development primitives and fuzz harnesses
- Async microservices with strict security boundaries (no_std capable)
AI/ML for Security
- Local ONNX inference pipelines for offline threat classification
- RAG systems over internal knowledge bases (zero data exfiltration)
- LoRA fine-tuning for domain-specific security NLP models
| Project Type | Description |
|---|---|
| 🔩 Firmware RE pipelines | Extract → analyze → model → patch cycles for IoT/embedded |
| 🦀 Rust security crates | Fuzz harnesses, safe parsers, Wasm plugin runtimes |
| 🤖 Offline AI inference | ONNX + RAG stacks, no cloud dependency |
| 📋 GRC automation | Compliance gap analysis tooling (SSI/ISO 27001) |
// trust no binary you haven't reversed yourself