Security Researcher & Reverse Engineer Remote - Worldwide

Independent security researcher specializing in reverse engineering, DRM, and tamper protection. No corporate hats—just deep-technical audits and FOSS.

9+ Years Active
RE · AppSec Domains
Remote Worldwide

Interactive Terminal

A real shell. Try ls, cat about.txt, neofetch, or help to explore.

visitor@psyirius:~$ 

↑↓ history  ·  Tab complete  ·  Ctrl+L clear  ·  Ctrl+C cancel

LIVE_INTEL // VULN_FEED

CVE-2026-X114
CRITICAL
AUTH_SERVICE
[PATCHED]
SYM-882-0D
HIGH
FIRMWARE_CORE
[0DAY]
CVE-2025-9981
MEDIUM
WASM_ENGINE
[DISCLOSED]
0XD-RCE-BETA
CRITICAL
HYPERVISOR
[PATCHED]
CVE-2025-1011
HIGH
KERNEL_MOD
[DISCLOSED]
CVE-2026-X114
CRITICAL
AUTH_SERVICE
[PATCHED]
SYM-882-0D
HIGH
FIRMWARE_CORE
[0DAY]
CVE-2025-9981
MEDIUM
WASM_ENGINE
[DISCLOSED]
0XD-RCE-BETA
CRITICAL
HYPERVISOR
[PATCHED]
CVE-2025-1011
HIGH
KERNEL_MOD
[DISCLOSED]

Standard Operating Procedure

Systematic deconstruction via rigorous methodology and a honed toolkit.

01_RECON

IDLE

OSINT, surface mapping, and logic analysis.

02_REVERSAL

IDLE

Decompilation, control flow plotting, and reversing.

03_EXPLOIT

IDLE

Weaponization and POC development.

~/toolkit
ls -la /opt/tools_
IDA Pro
Ghidra
Binary Ninja
Burp Suite
Frida
Wireshark
x64dbg
radare2
Metasploit
Nmap
GDB
Hashcat
CLASSIFIED // INTEL_FILE

Dossier

I operate at the intersection of offensive research and software engineering. My work focuses on deconstructing complex systems , security code audits , and hardening application logic against sophisticated tampering . Having never stepped into the corporate world, I maintain a strictly independent consulting practice , contributing to FOSS ecosystems while delivering private security services under high-stakes NDAs . Beyond professional work, I am an active CTF competitor , using high-stakes security competitions to sharpen offensive techniques and stay ahead of emerging threats .

PSYIRIUS // SECURE COMMS ID: PSY-8492-X

STATUS: ACTIVE

LEVEL: TS//SCI

CERTS:
  • OSCP (Offensive Security)
  • CRTE (Red Team Expert)
  • eWPTXv2 (Web Pen Testing)
RANKS:
  • HackTheBox - Pro Hacker
  • TryHackMe - Top 1%

Featured Research

Hands-on assessments, exploit development, and hardening work across modern stacks.

Most engagements are covered by non-disclosure agreements. Case studies will appear here as clearance is obtained.

Request private references →

Need a Security Review?

Available for vulnerability research, penetration testing, and security architecture reviews. Reach out at [email protected].

Support My Work

IDS // NET_SEC_PROTOCOL
ACTIVE
LOGIC // CH 1-4
WAITING
FREQ // WATERFALL
NO SIGNAL
处理
DECRYPT // BUFFER
IDLE