Security Researcher & Reverse Engineer Remote - Worldwide
Independent security researcher specializing in reverse engineering, DRM, and tamper protection. No corporate hats—just deep-technical audits and FOSS.
A real shell. Try ls, cat about.txt, neofetch, or help to explore.
↑↓ history · Tab complete · Ctrl+L clear · Ctrl+C cancel
Systematic deconstruction via rigorous methodology and a honed toolkit.
OSINT, surface mapping, and logic analysis.
Decompilation, control flow plotting, and reversing.
Weaponization and POC development.
I operate at the intersection of offensive research and software engineering. My work focuses on deconstructing complex systems, security code audits, and hardening application logic against sophisticated tampering. Having never stepped into the corporate world, I maintain a strictly independent consulting practice , contributing to FOSS ecosystems while delivering private security services under high-stakes NDAs . Beyond professional work, I am an active CTF competitor, using high-stakes security competitions to sharpen offensive techniques and stay ahead of emerging threats.
STATUS: ACTIVE
LEVEL: TS//SCI
Hands-on assessments, exploit development, and hardening work across modern stacks.
Most engagements are covered by non-disclosure agreements. Case studies will appear here as clearance is obtained.
Request private references →Available for vulnerability research, penetration testing, and security architecture reviews. Reach out at security@psyirius.dev.