Skip to content
View R16008882's full-sized avatar
Magiiic
Magiiic

Block or report R16008882

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
R16008882/README.md

R16008882

Firmware Reverse Engineer · Rust Security Developer

GitHub followers Profile views


pub struct Engineer {
    name:     &'static str,
    location: &'static str,
    focus:    [&'static str; 3],
    stack:    [&'static str; 4],
}

const ME: Engineer = Engineer {
    name:     "R16008882",
    location: "Marseille, France 🇫🇷",
    focus:    ["Firmware RE", "Rust/Wasm Security Tooling", "AI Inference Pipelines"],
    stack:    ["Rust", "Python", "C++", "WebAssembly"],
};

Core Expertise

Firmware & Binary Analysis

  • Static/dynamic analysis of embedded firmware (ARM, MIPS, x86)
  • Binary diffing, vulnerability research, CVE reproduction
  • Digital twin pipeline construction from RE'd firmware

Rust Security Tooling

  • Low-level tooling & plugins compiled to Wasm for portability
  • Memory-safe exploit development primitives and fuzz harnesses
  • Async microservices with strict security boundaries (no_std capable)

AI/ML for Security

  • Local ONNX inference pipelines for offline threat classification
  • RAG systems over internal knowledge bases (zero data exfiltration)
  • LoRA fine-tuning for domain-specific security NLP models

Toolchain

Rust Python WebAssembly C++ Ghidra Binwalk ONNX Linux


What I Build

Project Type Description
🔩 Firmware RE pipelines Extract → analyze → model → patch cycles for IoT/embedded
🦀 Rust security crates Fuzz harnesses, safe parsers, Wasm plugin runtimes
🤖 Offline AI inference ONNX + RAG stacks, no cloud dependency
📋 GRC automation Compliance gap analysis tooling (SSI/ISO 27001)

GitHub Stats


// trust no binary you haven't reversed yourself

Pinned Loading

  1. CVE-checks-Yocto CVE-checks-Yocto Public

    Un outil léger pour scanner les vulnérabilités (CVE) dans des systèmes Linux embarqués (Yocto, Buildroot, OpenWRT) à partir d’un rootfs monté 😽

    Python

  2. ldap-doc ldap-doc Public

    PROJET ACADÉMIQUE - Découvrir et configurer un annuaire LDAP pour organiser et sécuriser l'accès des utilisateurs aux ressources de l'entreprise.

  3. tp-link-bluetooth-diag tp-link-bluetooth-diag Public

    Diagnostic Linux d’un adaptateur Bluetooth USB : de la détection matérielle à la pile BlueZ 🐟

    Shell

  4. wd-mycloud-initramfs wd-mycloud-initramfs Public

    Boot d’un WD My Cloud Home Duo avec un initramfs minimal 🐙

    Batchfile