- 🎓 Currently pursuing a degree in Computer Engineering at the Hanoi University of Science & Technology (HUST).
- 🔬 Working as a Security Researcher at Vingroup and actively contributing to BKSEC.
- 🚩 Passionate about Reverse Engineering, Binary Exploitation, and Digital Forensics.
- 🌱 Continuously exploring and learning new concepts in Cybersecurity and Offensive Security.
I may be slow to respond.
Former Reverse Engineering with @SquidProxyLover @bincat_ctf @ph1sherctf | Flareon 11,12 Finisher
- Ha Noi
- 05:16
(UTC +07:00) - https://blog.nosiaht.com
- @_sondt_
Highlights
Pinned Loading
- AI-based-ICS-Incident-Investigation-System
AI-based-ICS-Incident-Investigation-System PublicThis project detects malicious or abnormal traffic in industrial control networks, visualizes network topology, and identifies compromised devices to safeguard critical infrastructure.
Jupyter Notebook 12
- Distributed-Computing
Distributed-Computing Public archiveDistributed Computing Interaction Framework: Optimizing the algorithm with the Server-Worker model
TeX 17
- CyberGuard-Lab/elfvulnscan
CyberGuard-Lab/elfvulnscan PublicA simple binary vulnerability scanner module for Linux that statically analyzes ELF binary files to identify potential vulnerabilities.
C++ 18
- Wayback-CTF
Wayback-CTF PublicCTF Scoreboard Archive is a web app for storing and displaying CTF scoreboards, supporting links (CTFd, rCTF), MHTML uploads, and GIF generation of competition progress.
Something went wrong, please refresh the page to try again.
If the problem persists, check the GitHub status page or contact support.
If the problem persists, check the GitHub status page or contact support.



