██████ ███████ ███ ██ ███████ ███████ ██ ███████
██ ██ ████ ██ ██ ██ ██ ██
██ ███ █████ ██ ██ ██ █████ ███████ ██ ███████
██ ██ ██ ██ ██ ██ ██ ██ ██ ██
██████ ███████ ██ ████ ███████ ███████ ██ ███████
I am Genesis, a 22-year-old security researcher and software engineer from Uruguay. I started my journey into cybersecurity at 15. My work focuses on low-level systems, kernel-mode development, and high-availability secure architectures.
Every project I create addresses a specific gap I've identified through hands-on research and testing. My code prioritizes production-grade quality, comprehensive documentation, and real-world usability.
class Genesis:
def __init__(self):
# Personal Information
self.name = "Genesis"
self.location = "Montevideo, Uruguay"
self.goal = "Canada / Security Research"
# Professional Identity
self.role = "Security Researcher & Software Engineer"
self.specialization = [
"Kernel-Mode Driver Development (WDM/WDF)",
"Endpoint Detection & Response (EDR)",
"Distributed Systems Architecture",
"Malware Behavioral Analysis",
"Advanced OSINT Frameworks"
]
# Technical Expertise
self.programming_languages = {
"expert_level": {
"C++": ["Windows API", "Kernel Drivers", "EDR Logic"],
"TypeScript/Node.js": ["High-performance APIs", "Monorepos", "Distributed Systems"],
"Python": ["Security Frameworks", "Automation", "Data Correlation"],
"Bash": ["Infrastructure Automation", "DevOps Tooling"]
},
"advanced_level": {
"C": ["Low-level Systems", "Memory Management"],
"Assembly (x86/x64)": ["Reverse Engineering", "Shellcode Analysis"],
"Rust": ["Secure Systems Development"]
}
}
# Active Projects
self.projects = {
"threat_detection_suite": {
"type": "EDR System",
"status": "Production",
"language": "C++/C",
"description": "Advanced Event-Driven EDR for Windows (Kernel + Userland)"
},
"mega_ticketing": {
"type": "Industrial Ticketing Monorepo",
"status": "Active",
"stack": ["Fastify", "React", "Redis", "Prisma"],
"description": "High-availability suite with Distributed Locking and Stripe integration"
},
"nexus_intelligence": {
"type": "OSINT Framework",
"status": "Stable",
"language": "Python",
"description": "Advanced reconnaissance and intelligence platform"
}
}
# Future
self.future = {
"target": "Security Research Roles in Canada",
"focus": "Low-level vulnerability research and automated threat detection"
}Advanced Event-Driven EDR for Windows
- Kernel Interception: Implements WFP callouts, Minifilter callbacks, and Registry/Thread notifications.
- Behavioral Correlation: State-of-the-art engine to detect Early Bird injection and Process Hollowing.
- Forensics: Automated process memory dumping and GTI enrichment.
- Self-Protection: Robust handle stripping logic to prevent EDR termination.
High-Performance Industrial Ticketing Monorepo
- Architecture: Distributed system with Fastify backend and React frontend.
- Concurrency: Distributed Locking Pattern using Redis Lua scripting for atomic seat reservations.
- Payments: Secure Stripe integration with cryptographically signed Webhooks.
- Reliability: Fully dockerized with Nginx load balancing and PostgreSQL persistence.
Unified OSINT Reconnaissance Platform
- Automated data correlation across 20+ social platforms and GitHub forensics.
- Weighted risk assessment algorithm for actionable intelligence.
- Containerization: Docker, Docker Compose, GKE (Kubernetes).
- CI/CD: Industrial-grade GitHub Actions with Snyk/OSV-Scanner integration.
- Monitoring: Prometheus metrics and Grafana dashboards.
- IaC: Terraform for cloud resource provisioning.
ISO 27001 - Information Security Management (2025)
