András Gémes

shadowshell.io | github.com/gemesa | linkedin.com/gemesa | gemesa@protonmail.com

Summary

LLVM compiler engineer and malware analyst with embedded systems background and 7 years of cybersecurity experience. Hands-on experience in binary analysis, reverse engineering and malware analysis. Certified in Sec+, CASP+/SecX, CEH and others. Open to roles in security research, compiler-level obfuscation, reverse engineering or malware analysis.

Work experience

Compiler Engineer | Malware Analyst @ HighTec EDV-Systeme GmbH - Budapest, Hungary

Software Engineer | Application Security Engineer @ Knorr-Bremse - Budapest, Hungary

Technical skills

Programming languages: C, C++, Rust, Objective-C, Swift, Python 3, Java, Assembly (ARM64, x86-64), Bash

Reverse engineering (static): Ghidra, IDA, Binwalk, capa, otool, ipsw, Apktool, jadx

Reverse engineering (dynamic): LLDB, GDB, x64dbg, Frida, strace, eBPF, ADB, QEMU, Qiling, VirtualBox

Detection engineering: Sigma, YARA, Suricata

Vulnerability research: checksec, ROPgadget, AFL++

Network analysis and protocols: Wireshark, Zeek, FakeNet-NG, INetSim, TCP, UDP, HTTP, HTTPS, DNS

Platforms and DevOps tools: Linux (Fedora, Ubuntu), macOS, Windows, Git, Docker, GitHub Actions, Jenkins

Certifications

CompTIA Security+, CompTIA CASP+/SecurityX, EC-Council CEH, TCM Security PMAT, Invoke RE IMBT and others.

Open source contributions

Education

MSc in Mechatronics Engineering

Budapest University of Technology and Economics - Budapest, Hungary

BSc in Mechatronics Engineering

University of Pannonia - Veszprém, Hungary

Continuous education

Currently I am learning on Mobile Hacking Lab and reading Advanced Apple Debugging & Reverse Engineering.