██████╗ ███╗   ██╗███████╗██████╗ ██████╗ ██╗      █████╗ ███╗   ███╗███████╗
 ██╔═══██╗████╗  ██║██╔════╝╚════██╗██╔══██╗██║     ██╔══██╗████╗ ████║██╔════╝
 ██║   ██║██╔██╗ ██║█████╗   █████╔╝██████╔╝██║     ███████║██╔████╔██║█████╗
 ██║   ██║██║╚██╗██║██╔══╝  ██╔═══╝ ██╔══██╗██║     ██╔══██║██║╚██╔╝██║██╔══╝
 ╚██████╔╝██║ ╚████║███████╗███████╗██████╔╝███████╗██║  ██║██║ ╚═╝ ██║███████╗
  ╚═════╝ ╚═╝  ╚═══╝╚══════╝╚══════╝╚═════╝ ╚══════╝╚═╝  ╚═╝╚═╝     ╚═╝╚══════╝

~ Grok
  ~ The Dark Arts
  ~ Computer Networks
  ~ glibc Heap Exploitation
  ~ Web Application Security
  ~ Reverse Engineering Malware
  ~ Machine Learning for Trading
  ~ Software Analysis and Testing
  ~ Data Structures and Algorithms

~ Projects
  ~ MapReduce
  ~ splintershell
  ~ Distributed File System

~ Socials
  ~ GitHub
  ~ LeetCode
  ~ LinkedIn

~ Résumé

~ Contact