András Gémes

shadowshell.io | github.com/gemesa | linkedin.com/gemesa | gemesa@protonmail.com

Summary

Compiler engineer and reverse engineer with embedded systems background and 7 years of cybersecurity experience. Hands-on experience in binary analysis, reverse engineering and malware analysis. Certified in Sec+, CASP+/SecX, CEH, PMAT, IMBT and others. Looking to apply my expertise as a security engineer, reverse engineer or malware analyst.

Work experience

Compiler Engineer | Reverse Engineer @ HighTec EDV-Systeme GmbH - Budapest, Hungary

Application Security Engineer @ Knorr-Bremse - Budapest, Hungary

Technical skills

Programming languages: C, C++, Rust, Objective-C, Swift, Python 3, Java, Assembly (ARM64, x86-64), Bash

Reverse engineering (static): Ghidra, IDA, otool, llvm-objdump, ipsw, Apktool, jadx, Binwalk, capa, YARA, DiE

Reverse engineering (dynamic): LLDB, GDB, Frida, DTrace, ADB, eBPF, strace, QEMU, Qiling, VirtualBox, x64dbg

Vulnerability research: checksec, ROPgadget, AFL++, ASan, MSan, TSan, UBSan

Network analysis and protocols: Wireshark, Suricata, Zeek, FakeNet-NG, INetSim, TCP, UDP, HTTP, HTTPS, DNS

Platforms and DevOps tools: Linux (Fedora, Ubuntu), macOS, Windows, Git, Docker, GitHub Actions, Jenkins

Embedded systems and protocols: STM32, ESP32, Wi-Fi, CAN, SPI, UART, I2C

Certifications

CompTIA Security+, CompTIA CASP+/SecurityX, EC-Council CEH, TCM Security PMAT, Invoke RE IMBT and others.

Open source contributions

Education

MSc in Mechatronics Engineering

Budapest University of Technology and Economics - Budapest, Hungary

BSc in Mechatronics Engineering

University of Pannonia - Veszprém, Hungary

Continuous education

Currently I am actively learning on TryHackMe and reading Advanced Apple Debugging & Reverse Engineering.