- 🔐 4+ years as a Computer Security Professional with 10+ years in software & penetration testing. Ranked top 2 % on TryHackMe (Q4 2022).
- 🛠️ Reverse-engineering with tools like IDA, Ghidra, Hopper and Frida.
- 📱 Deep knowledge of OSX, Android, Windows and Linux internals
- 🤖 Experience with writing C2 frameworks and payloads that could bypass AV detections.
- ⚡ Fun fact – I hack hardware too: NFC/RFID cloning, IR & FM attacks, drones, SBCs & more.
Company | Position | Stack / Focus |
---|---|---|
NomixCloner | Mobile App Security Engineer | Obj-C • Swift • Python • C • iOS hooks & bypass (FaceTec, jailbreak, GPS spoof) |
Previously: Team Lead @ Social Rise Studios (Go, Python, Supabase) • Team Lead @ Qwipboard • Technician roles @ Mobile Klinik & uBreakiFix
Project | What it does | Tech Highlights |
---|---|---|
TinyC2 | A simple TinyC2 Framework with a stager | Heap encryption • Windows API • Ekko |
RedditDominator | Personality-driven Reddit automation swarm | React • Python • Redis • Docker + K8s |
DeviceShield | iPhone privacy, app level proxy, location and isolated keychain | CydiaSubstrate • Obj-C • Non-JB env |
BumbleDate | Auto-schedules dating-app matches | Selenium • Flutter • Ollama LLM |
API Wrappers | Confidential reversed private networking API lib | TCP RPC • Secure SSL • Frida |
Kali Linux
• Metasploit
• nmap
• Ghidra
• IDA
• Frida
• SliverC2
• Cobalt Strike
Go
• Swift/Obj-C
• Python
• JavaScript
• MongoDB & SQL
• Docker & Kubernetes
• LLVM/LLDB/GDB
MITRE ATT&CK
red-teaming • SDLC security • Agile leadership • Team mentoring
- Portfolio : aboutsharon.vercel.app
- Email : [email protected]
- TryHackMe : Top 2 % (username)
“Security is not a product but a process.” — Bruce Schneier