Nofil Qasim
Senior Vulnerability Researcher at Ebryx. Specializing in low-level security, exploit development, and binary exploitation.
Uncovering vulnerabilities in system design and crafting robust security mitigations across cloud environments and embedded systems.
About Me
I'm a Computer Science professional passionate about uncovering security vulnerabilities at the intersection of system design and implementation. My work focuses on finding flaws that can be exploited and developing robust mitigations.
Currently at Ebryx F.Z.C, I lead research initiatives identifying and mitigating low-level attack vectors against cloud environments. I've worked extensively on compile-time and run-time security mitigations like SHSTK and IBT.
My research interests lie in discovering system design vulnerabilities, exploit development techniques, and crafting architectural mitigations that eliminate entire vulnerability classes at a fundamental level.
Binary Exploitation
x86-64, ROP chains, heap exploitation, and advanced reverse engineering techniques
Low-Level Systems
Kernel vulnerabilities, OS development, WebAssembly security, and system design flaws
Security Research
ZTNA applications, malware analysis, AV/EDR evasion, and novel mitigation techniques
Education
Team
Professional Experience
Senior Vulnerability Researcher
- ▸Identified and demonstrated prevalent low-level attack vectors against cloud environments
- ▸Formulated generic mitigation techniques to wipe out entire vulnerability classes
- ▸Performed detailed research on compile-time mitigations (SHSTK, IBT) on precompiled binaries
- ▸Designed run-time alternatives to compile-time mitigations for JITed languages like Lua
Vulnerability Researcher
- ▸Led team performing security assessments on ZTNA solution, discovered 20+ 0-days
- ▸Set up distributed fuzzing environment for Linux Kernel using syzkaller on ESXi
- ▸Researched and implemented Linux usermode and kernel exploits (n-day & 1-day)
- ▸Designed architectural mitigations against discovered vulnerabilities
Malware Researcher
- ▸Worked on fully featured RAT (Remote Access Trojan) development
- ▸Successfully tested Windows exploits and researched AV/EDR evasion techniques
- ▸Evaded major security products: Crowdstrike EDR, Kaspersky AV, Windows Defender
- ▸Researched initial access and malware deployment against medium-sized organizations
Teaching Experience
Volunteering
Featured Projects
Open source projects and tools I've built for security research and systems programming
Powerful CLI tool for automated security scanning of GitHub repositories using Semgrep and CodeQL
Custom Operating System kernel written from scratch in C and x86-64 Assembly
Low-level debugger written in Python for debugging and analysis of binary programs
Comprehensive research documentation on WebAssembly security and exploitation techniques
Assembler for the nand2tetris course, implementing low-level assembly to machine code translation
Interested in my work? Check out more on GitHub
View All ProjectsResearch & Publications
WebAssembly Exploitation Techniques
Novel approach to applying x86-64 exploitation techniques on WebAssembly binaries
Key Achievements:
- →Formulated innovative research methodology
- →Discovered differences between WASM modules built from same source
- →Conducted binary fuzzing on WebAssembly modules
- →Implemented ROP via WASM jump table overwrite
- →Adapted heap exploitation techniques (House of Force) to emlmalloc and dlmalloc
MIPS Architecture Programming Guide
Comprehensive guide to MIPS32/64 architecture and assembly programming
Key Achievements:
- →Verified research claims and hypotheses
- →Reviewed and validated technical sources
- →Prepared research paper for submission
- →Documented salient features of architecture
- →Created comprehensive assembly programming guidelines
Key Security Findings
ZTNA Security Assessment
Led comprehensive security assessment of Zero Trust Network Architecture solution
Cloud Attack Vectors
Identified prevalent attack vectors against cloud environments
Mitigation Research
Designed architectural mitigations against vulnerability classes
Malware Analysis
Successfully evaded Crowdstrike, Kaspersky, Windows Defender
Current Research Interests
- System design vulnerabilities and exploitation
- WebAssembly security and binary exploitation
- Linux kernel vulnerabilities (n-day & 1-day)
- Cloud environment attack vectors
- Compile-time and run-time mitigations
- AV/EDR evasion techniques
- JIT language security
- Supply chain attack vectors
Skills & Expertise
Deep expertise in security research, low-level systems, and exploit development
Programming Languages
Security & Exploitation
Tools & Frameworks
Operating Systems
Specializations
Methodologies
0-day Vulnerabilities Found
Years in Security Research
Open Source Projects
Recognition & Contributions
GitHub Achievements
- ★ 66 Followers
- ★ Arctic Code Vault Contributor
- ★ Pull Shark Achievement (2x)
Links & Presence
- ORCID: 0000-0002-6222-2480
- Team: Kernelcide Security Research
- Focus: Low-level Security & Systems
Blog & Articles
Technical articles, research findings, and in-depth guides on security and systems programming
WebAssembly Binary Exploitation
Deep dive into applying x86-64 exploitation techniques on WebAssembly binaries, including ROP chains and heap exploitation.
Low-Level Cloud Security Mitigations
Novel approaches to implementing compile-time and run-time mitigations against cloud environment attack vectors.
Linux Kernel Vulnerability Research
Methodology for discovering and exploiting Linux kernel vulnerabilities using advanced fuzzing techniques.
Malware Development & AV Evasion
Techniques for developing sophisticated malware and bypassing major security solutions like Crowdstrike EDR.
ZTNA Architecture Assessment
Comprehensive guide to evaluating Zero Trust Network Architecture implementations and discovering vulnerabilities.
Operating System Development
Building custom kernels, multiboot compliance, and low-level system architecture from scratch.
Full Blog & Research
Visit my personal blog for complete articles, research papers, notes, and technical deep-dives into security research and systems programming.
Visit BlogGet In Touch
Interested in collaboration, security research opportunities, or have questions? Let's connect.
Other Ways to Connect
Blog & Updates
Follow my technical blog at nofilqasim.info for the latest research findings and articles.
Visit Blog →X / Twitter
Stay updated with my security research insights and technical discussions.
Follow @nofilq →Interested in discussing security vulnerabilities, research collaborations, or opportunities?