Hi my real name is Tanishq. Vulnerability researcher focused on memory corruption, binary exploitation, and low-level systems internals.
Currently working through the full stack from the ground up — C, x86-64 assembly, OS internals, and hardware. No shortcuts. No abstractions until I understand what's underneath them.
Areas of focus
- Memory corruption & exploit development
- Syscall-level systems programming
- Binary analysis & reverse engineering
- Low-level C — no libc, no malloc, just syscalls and intent
Current work
- CS:APP (Bryant & O'Hallaron)
- Syscall-only C tooling built from scratch
- CTF challenges focused on binary exploitation
Stack
- Arch Linux · Neovim · x86-64 · GDB · tmux
Website