I build scalable systems. Then I break them.
Full-Stack Developer & Security Researcher. I create custom programming languages, high-performance games, and secure web architectures.
Check out the Code01. The Toolbox
Languages
Engineering
Security & Tools
02. Engineering
Engineered a full three-stage runtime (Lexer, Parser, Evaluator) from scratch in Go. The language supports complex semantics including lexical scoping, closures, and class-based OOP with strict public/private access modifiers. I also built an integrated debugger capable of taking call-stack snapshots and handling step-through execution logic.
Built as the primary ecosystem for VirtLang, Xel introduces a recursive module resolution system with semantic versioning. It features a robust standard library (OS, Time, Threads, Math) and a global package registry hosting community modules. Key technical highlights include a multithreaded worker system using Go's concurrency primitives and a Foreign Function Interface (FFI) for native C-interoperability.
A research project focused on low-level code generation. It uses the TypeScript Compiler API for AST processing and features a custom backend that manages the x86-64 calling convention, stack alignment, and register allocation. The project includes a functional Intel-syntax assembly generator and a transitionary LLVM IR emitter for cross-platform optimization research.
A low-level security research project demonstrating Windows process injection techniques. It features a custom injector using 'CreateRemoteThread', an IAT (Import Address Table) hook to hijack system calls, and a signature-scanning engine that performs live byte-patching on target process memory to disable RNG logic via 'VirtualProtect' and 'memcpy' of raw opcodes.
Engineered a sophisticated runtime environment within Roblox, including 'ImmersiveConsoleV2'-a mini-OS featuring a Virtual File System (VFS), process management (PCBs), and a POSIX-like shell. Developed a modular Anti-Cheat Subsystem (ACS) that utilizes decaying severity scores and behavioral hooks (speed, flight, noclip) to detect and mitigate exploits in real-time. Also authored a custom Bezier-based UI animation engine and a Tailwind-inspired design system.
Engineered a Go-based system that bridges local LLM inference (llama.cpp) to a QEMU-managed environment. Developed a custom driver using the QEMU Machine Protocol (QMP) for low-level hardware control and VNC for real-time framebuffer streaming. The project implements a complex tool-calling architecture, allowing the agent to autonomously inject keyboard and mouse events into a guest Debian OS via a custom-built VNC-to-UI bridge.
An ambitious hardware emulation project that implements a functional x86-64 CPU core in JavaScript. It successfully handles the transition from 16-bit Real Mode to 64-bit Long Mode, including a custom MMU with 4-level paging support. The emulator reached the milestone of booting SeaBIOS and Bochs BIOS by simulating legacy hardware interfaces (PIC, PIT, VGA Text Mode, and CMOS). It evolved from a previous research piece, EmCPU, which featured a custom stateful REPL debugger.
Architected a Temporal Convolutional Network (TCN) to treat keystroke generation as a scheduling problem, predicting precise inter-key deltas and dwell durations. Developed a synthetic dataset generator that simulates keyboard-drift typos and a curses-based TUI recorder for capturing high-fidelity human typing sessions. The project features a cross-platform inference engine (Node.js/Python) via ONNX, capable of simulating natural hesitation and real-time self-correction logic.
Created to replace fragmented system utilities (pbcopy, xcopy, clip) with a single, high-performance binary. It features a custom SanitizedWriter to prevent terminal corruption when catting binary-heavy streams and utilizes an auto-detection engine to transparently handle image copying. By leveraging Go's IO primitives like 'io.TeeReader', it allows for simultaneous clipboard writing and stdout streaming with zero-copy overhead.
Engineered as a 'technical overkill' for a basic homework task, this project features a decoupled architecture with separate Core, CLI, and GUI layers. Instead of simple menu-based inputs, it implements a token-mapped evaluator that supports parentheses, operator precedence, and advanced math (roots, exponents). It utilizes a secure character-whitelist mapping strategy to allow the use of Python's eval() engine while maintaining a sandbox that prevents arbitrary code execution.
An early exploration into language design that implements a custom Domain Specific Language (DSL) for hardware control. It features a hand-rolled tokenizer with support for multi-line comments and a stateful REPL (Read-Eval-Print Loop). The engine wraps low-level system hooks to provide a simplified syntax for mouse and keyboard manipulation, including support for file-based execution and infinite repeat-looping of macro scripts.
Built a modular 'meme-bot' architecture that chains multiple AI services to produce original video content. The pipeline utilizes Cohere for script generation, a local VITS model for Text-to-Speech, and FFmpeg/Sharp for dynamic video editing and audio mixing. It features a custom weighting system for topic selection, automated YouTube uploads via OAuth2, and a legacy scraping module equipped with a local HuggingFace computer vision model for NSFW filtering.
Inspired by the AI from Interstellar, this project implements a polyglot agent architecture. A Node.js server acts as the central orchestrator, managing conversation state with the Google Gemini API, while a Python client handles local, hardware-intensive tasks like Speech-to-Text (Whisper) and Text-to-Speech (Coqui TTS). Communication is handled via a real-time Socket.IO bridge, allowing the AI to autonomously execute shell commands, manage files, and perform system tasks based on voice commands.
Instead of a static build, I engineered a dynamic SSR application using Express and Handlebars. The core feature is a custom stale-while-revalidate (SWR) caching layer that serves pre-compressed Gzip and Brotli assets based on client headers. It also includes 'TinyPrint,' a custom in-memory asset pipeline that automatically inlines critical CSS/JS, sorts attributes, and minifies the final HTML before caching, ensuring minimal time-to-first-byte (TTFB). The entire site is powered by a single, schema-validated data source using Zod and secured with a strict Content Security Policy (CSP).
03. Security Research
I believe you can't build secure systems unless you know how to break them.
Open Redirect in OAuth Flow Leading to Token Theft
Discovered an unvalidated 'redirect' parameter in a third-party OAuth callback endpoint. An attacker could craft a malicious link using a trusted domain, which would then redirect the victim to an attacker-controlled site with their valid session token appended to the URL, leading to immediate account takeover.
LLM Prompt Injection Enabling API Abuse
Identified a vulnerability where user-controlled input from a web form was passed directly to a backend Gemini LLM without proper sanitization or context separation. This allowed for prompt injection attacks that could override the model's system instructions and utilize the API for unintended, resource-intensive tasks, creating a risk of significant financial cost via API credit consumption.
Regex Bypass in Sanitizer Leading to XSS & Clickjacking
Found a flaw in a DOMPurify URI regex that failed to properly anchor to the end of the domain name. This allowed for subdomain bypasses (e.g., 'trusted.com.evil.com'). I escalated this to a full-page clickjacking attack by leveraging whitelisted 'class' attributes to create an invisible, full-screen malicious link using TailwindCSS utility classes.
Information Disclosure via Insufficient Server-Side Filtering
Discovered that the backend API relied on the client-side application to filter and hide private user data. By intercepting network traffic or directly querying the API endpoint, it was possible to bypass user privacy settings and retrieve full, unredacted profile information, including Discord user IDs and other sensitive details.
Backend Validation Bypass for User-Supplied Content
Identified an endpoint where the frontend performed strict validation on user-submitted URLs (for avatars/banners), but the backend API accepted any URL without checks. This allowed for the submission of arbitrary links, creating a potential vector for IP/header logging (tracking beacons) and bypassing the intended content controls.
04. Initialize Handshake
I am currently open to Full-Stack and Security Engineering roles. If you have a system that needs building—or testing—ping me.