Security R&D engineer with 10 years of experience. 6 of them in security consulting and 4 in a mixed software engineering / cybersecurity research (80/20) role. Native Russian speaker of Estonian origin fluent in English.
🔐 Mobile Security Automation @ Global Scale
- Ship & maintain the backbone of an enterprise-grade, industry-scale MAST platform
- Deep Android expertise: advanced Frida hooks for runtime instrumentaiton
- Handle low-level Android reverse engineering, AOSP deep-dives, and custom firmwares
🛠 Core Technical Stack
- Python – enterprise backend services
- TypeScript – Frida instrumentation
- C / C++ / Qt – low-level bypasses and emulators
- Java / Kotlin – Android-specific tooling
- IDA Pro + Frida – reverse engineering + dynamic hooks
- GitLab CI – DevSecOps pipeline elements
� Former: Secure Architecture & Consulting (2015–2021)
- Delivered penetration testing, architecture risk assessments, and OWASP Top 10 training
- Held CREST Registered Penetration Tester (CRT PEN) – now fully product/engineering focused
🎮 Hobby Hacking
- MU Online hooks (2005–2008) – early C++ memory manipulation
- EVE Online bots (2009–2016) – automation + anti-detection
- Lineage II antibot/anticheat bypass (2019–2021) – layered protection reverse engineering, private code archives
- Assetto Corsa KN5 decryption + 3D model extraction (2024+) – PC & Android titles, private code archives
📮 Contacts
- You can reach me on Telegram @pandasauce
- 🗒 Unless you are after my resume; for that try LinkedIn
- 📰 A showcase of my reverse engineering skills is avaiable in this writeup for CVE-2020-7958
- 🖋 I occasionally document the things I dig into in my free time at pandasauce.org