back to me

Let's get serious then.

. This is what you want to read if you're an employer, admissions officer, or anyone with serious intentions.

Web Development

I've been doing full-stack development for over 4 years now, and I care deeply about building products that are not only polished but highly functional and performant. My core stack is React, Next.js, TypeScript, and Tailwind CSS, though I've also worked with vanilla HTML and other frameworks such as Vue. I handle state with Zustand, manage databases with Supabase, Firebase, and IndexedDB, and cache with Redis. I also have extensive experience with more specialised libraries such as Three.js, Monaco Editor, Recharts, and KaTeX. I test all of my products with Jest to maintain code quality and ensure everything is production-ready, BrowserStack to verify cross-platform compatibility, and Polypane to fine-tune responsive design across varying screen sizes and resolutions.

Python & Machine Learning

I've been writing Python for 7 years, which has allowed me to not only work fluently in the language itself but develop a strong focus in specific areas: scraping, browser automation, and machine learning. For web-related tasks, I use DevTools and Burp Suite to their full capability, performing digital forensics to write fast, undetectable, and stable scraping and automation solutions. For machine learning and reinforcement learning, I have studied and applied DQNs, CNNs, and LSTMs using PyTorch, including work conducted at the Research Institute of Tsinghua University in Shenzhen.

C++

I use C++ exclusively for competitive programming. Whilst this means I don't carry the same breadth of software development experience in C++ as I do in my other languages, this is a deliberate choice — I'd rather maintain a sharp, focused knowledge of what actually matters in competition than dilute that with language features that don't serve that goal.

Reverse Engineering

It's worth noting that I only ever practise reverse engineering within legally clear or grey territory. I have never performed, and have no intention of performing, anything malicious. That said, I have experience across several platforms. On the web, I use Burp Suite and Wireshark to intercept, analyse, and map out traffic flows from closed systems, effectively reading the undocumented API of anything with a network connection. On Android, I work with virtual machines, Ghidra, JADX, Frida, APKTool, and Burp Suite as a proxy to decompile, instrument, and inspect applications at runtime. I've also spent a fair amount of time working through files with entirely undocumented extensions, using ImHex to read raw binary and hex values, identify encryption schemes, and decompress RLE-encoded data to get at whatever is actually inside.