András Gémes

shadowshell.io | github.com/gemesa | linkedin.com/gemesa | gemesa@protonmail.com

Summary

Security researcher with 8 years of experience. Hands-on experience in malware analysis, reverse engineering and vulnerability research. Certified in Sec+, CASP+/SecX, CEH and others. LLVM compiler engineering (code obfuscation) and embedded systems background. Open to roles in malware analysis, reverse engineering and vulnerability research.

Work experience

Security Researcher @ HighTec EDV-Systeme GmbH - Budapest, Hungary

Application Security Engineer @ Knorr-Bremse - Budapest, Hungary

Technical skills

Reverse engineering (static): DiE, Ghidra, IDA, ILSpy, dnSpy, Binwalk, Apktool, jadx, otool, ipsw

Reverse engineering (dynamic): x64dbg, Sysinternals, LLDB, GDB, Frida, ADB, QEMU, Qiling, VirtualBox, strace

Detection engineering: YARA, Sigma, Suricata, capa

Programming languages: C, C++, Rust, Objective-C, Swift, Python 3, Java, Assembly (ARM64, x86-64), Bash

Vulnerability research: checksec, ROPgadget, AFL++

Network analysis and protocols: Wireshark, Zeek, FakeNet-NG, INetSim

Platforms and DevOps tools: Linux (Fedora, Ubuntu), macOS, Windows, Git, Docker, GitHub Actions, Jenkins

Certifications

CompTIA Security+, CompTIA CASP+/SecurityX, EC-Council CEH, TCM Security PMAT, Invoke RE IMBT and others.

Open source contributions

Education

MSc in Mechatronics Engineering @ Budapest University of Technology and Economics

BSc in Mechatronics Engineering @ University of Pannonia

Continuous education

Currently learning on Mobile Hacking Lab (Android and iOS application security courses).