π―Skills5
Performs comprehensive static and dynamic code analysis, identifying vulnerabilities, architectural patterns, and potential optimization opportunities across multiple programming languages.
Assists in solving cryptography challenges by analyzing, decoding, and breaking various encryption techniques used in Capture The Flag (CTF) competitions
Quickly analyze binary files, identify potential threats, extract metadata, and provide initial security assessment for reverse engineering workflows.
Assists in binary exploitation, shellcode generation, and vulnerability analysis for Capture The Flag (CTF) pwn challenges and security research.
Automates reverse engineering tasks for CTF challenges, providing disassembly, decompilation, and vulnerability analysis tools for binary files.