Skip to content
View tedanvosin's full-sized avatar

Highlights

  • Pro

Block or report tedanvosin

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
tedanvosin/README.md

πŸ‘‹ Hi, I'm Vedant Soni

LinkedIn Email Profile CTF


πŸ” Cybersecurity and Networking Enthusiast

I’m currently pursuing my Master’s in Computer Science at Arizona State University, with a research focus on analyzing type inference in decompilers at SEFCOM Labs @ ASU. I love playing CTFs, specializing in Reverse Engineering and Binary Exploitation and creating cool tools that make reverse engineering easier and more efficient.


πŸ’» Tech Stack

🧠 Languages

x86 Assembly C C++ Python Java JavaScript Bash PowerShell SQL


🧰 Tools & Frameworks

πŸ”„ Binary Reverse Engineering

IDA Pro Ghidra Binary Ninja Angr Radare2

πŸ’₯ Binary Exploitation and Debugging

GDB WinDbg LLDB

πŸ€– Android Reverse Engineering

JADX MobSF APKTool

🌐 Networking & Packet Analysis

Wireshark Nmap tcpdump

πŸ”Έ Web Security & Exploitation Frameworks

Metasploit Burp Suite OWASP ZAP

πŸ’» Operating Systems

Linux MacOS Windows


🎯 CTF and Community

  • πŸ₯· CTF Team Member – Shellphish & ASU Hacking Club
  • πŸ† Past CTF Solves: Solutions for my past CTF challenges – View Repository
  • 🟒 pwn.college Green Belt – Specializing in Reverse Engineering and Pwning
  • βš”οΈ Active on HackTheBox & HackerOne (Web, RE, Network)

πŸš€ Projects

πŸ”Έ Android Malware Reverse Engineering
β†’ Decompiled & analyzed 7+ malicious APKs
β†’ Identified malware behavior like privilege escalation & exfiltration

πŸ”Έ Blockchain & AI for Healthcare Compliance
β†’ Researched AI/ML + blockchain models for HIPAA & cybersecurity use cases


πŸ“œ Certifications

Completed

CompTIA Security+ Google

In-Progress

CEH CCNA

Popular repositories Loading

  1. Benchmarking-Type-Inference-in-Decompilers Benchmarking-Type-Inference-in-Decompilers Public

    Benchmarking Type Inference in Decompilers

    Python 2 4

  2. CTF CTF Public

    CTFs played personally

    CSS 1

  3. ctf-archive ctf-archive Public

    Forked from pwncollege/ctf-archive

    This is a comprehensive collection of challenges from past CTF competitions. The challenges are stored with REHOST details and can be run on pwn.college website.

    HTML

  4. tedanvosin tedanvosin Public

  5. DAILA DAILA Public

    Forked from mahaloz/DAILA

    A decompiler-agnostic plugin for interacting with AI in your decompiler. GPT-4, Claude, and local models supported!

    Python

  6. retypd-ghidra-plugin retypd-ghidra-plugin Public

    Forked from GrammaTech/retypd-ghidra-plugin

    Retypd plugin for Ghidra reverse engineering framework from NSA

    Java