![@borari@sh.itjust.works avatar](https://mbin.grits.dev/media/cache/resolve/avatar_thumb/38/b0/38b024ba8c8a9621434233302b3a4a62b2886cb921ec376a5d17337bd6e37ae0.png)
![@borari@sh.itjust.works cover](https://mbin.grits.dev/media/cache/resolve/user_cover/40/8c/408c9d522a36761e48ff19006741be3f7e248815d343b502e14ca666a729d31c.png)
![@borari@sh.itjust.works avatar](https://mbin.grits.dev/media/cache/resolve/avatar_thumb/38/b0/38b024ba8c8a9621434233302b3a4a62b2886cb921ec376a5d17337bd6e37ae0.png)
Cybersecurity professional with an interest in networking, and beginning to delve into binary exploitation and reverse engineering.
This profile is from a federated server and may be incomplete. For a complete list of posts, browse on the original instance.