Independent security researcher exploring Android internals, binary analysis, and the systems most people never look at.
I take apart what others build — not to break it, but to understand it.
Self-taught reverse engineer based in India. I spend most of my time deep in smali bytecode, native libraries, and the parts of mobile apps that aren't supposed to be looked at.
Outside of research, I build small tools that solve specific problems — Telegram bots, Android utilities, and automation scripts. Quiet work, mostly.
I believe the best engineering is the kind nobody notices, until it isn't there.
Hours in disassemblers, a few good cups of tea, and the patience to read what the code actually does.
A small selection of recent projects. More on request.
A published utility app available on the Google Play Store, built and shipped from the ground up. Focused on small, useful tools for power users.
Custom tooling for Android application analysis, hooking, and modification workflows. Built around frida, apktool, and a lot of patience.
Automation systems built for repetitive workflows, deployed on cloud infrastructure with uptime as a non-negotiable.
Lightweight backend services for access control and remote device management. Quiet, fast, and hard to break.
Mostly low-level, occasionally high-level, always practical.
Open to interesting research, freelance work, and quiet conversations about systems.