Hands-on experience defeating Cloudflare, Queue-it, Akamai, DataDome, Incapsula and PerimeterX in production. Mobile reverse engineering, TLS fingerprint emulation, HTTP/2 manipulation. Operator of PoryAIO — backend tooling shipped to 200+ paying users.
PoryAIO
Backend infrastructure shipped to 200+ paying users. Live coverage of major retail platforms (Fnac, Cultura, Amazon, Pokémon Center, MediaMarkt, Micromania, Pagro, King Jouet) with full WAF evasion, TLS spoofing (JA3/JA4), and HTTP/2 pseudo-header manipulation.
Vinted Monitoring Bot
Open-source monitoring tool adopted by 300+ users. Resilient scraping at 500+ daily listings with real-time Discord notifications. AsyncIO-based rate-limit handling.
Anti-Bot Research
Reverse engineering of enterprise anti-bot stacks: Cloudflare Bot Management, Akamai Bot Manager, DataDome, Incapsula (Imperva), PerimeterX, Queue-it. Mobile app decompilation (Jadx, Frida), traffic interception (Wireshark, mitmproxy), TLS handshake analysis, sensor payload deobfuscation, virtual queue priority manipulation.
Vinted Bot V2 — Go Rewrite
Complete rewrite for 10x throughput. Go concurrency, Redis deduplication, and TLS fingerprint emulation to defeat DataDome. Docker-ready deployment.
Building Adversarial
Infrastructure.
From engineering automated systems in Beijing to bypassing production WAFs in France, my focus is performance, security, and reliability under hostile conditions.
Software Engineering Intern
- ●Engineered 4 interconnected management systems, automating 80% of manual tasks.
- ●Reduced backend latency by 60% (3x gain) via architectural optimization.
- ●Implemented Redis-backed notifications & real-time KPI dashboards adopted by 100% of management.
Network Latency
Endpoint response time
Technologies & Tools
- Python
- Go
- C (Systems)
- TypeScript
- React
- Docker
- Redis
- Wireshark
- Jadx
- Mitmproxy
- Charles Proxy
- HTTP/2
- TLS/JA3
- Python
- Go
- C (Systems)
- TypeScript
- React
- Docker
- Redis
- Wireshark
- Jadx
- Mitmproxy
- Charles Proxy
- HTTP/2
- TLS/JA3
Get in touch
Open to red team / pentest / security research roles, and to discussing backend or anti-bot work.