Engineering
the Edge Between
Humans & Machines
Security Researcher specializing in reverse engineering anti-bot systems. Expert in deobfuscating JavaScript, solving WASM puzzles, and bypassing fingerprinting techniques.
Security Research
Skills honed through hobby projects and professional engagements, specializing in reverse engineering bot detection systems
Imperva Incapsula Bypass
Cracked Imperva's reese84 cookie generation by reconstructing their entire client-side validation flow from obfuscated code.
TECHNIQUES USED:
PerimeterX Deobfuscator
Built a deobfuscator for PerimeterX's heavily protected JavaScript that reveals their behavioral tracking and WASM integration.
TECHNIQUES USED:
Browser Fingerprint Scanner
Demonstrating browser fingerprinting techniques used by bot detection systems. Your browser reveals more information than you might think.
Hi, I'm Jay
I dissect bot detection systems and analyze obfuscated code to understand how modern web defenses work. My research focuses on responsible disclosure, improving defensive security, and developing evasive web scraping techniques.
Security Research
Areas of expertise in offensive security and reverse engineering
Web Application Security
Identifying and exploiting vulnerabilities in modern web apps, from XSS to authentication bypasses.
Bot Detection & Evasion
Reverse engineering anti-bot systems like PerimeterX, DataDome, and custom fingerprinting solutions.
Reverse Engineering
Analyzing obfuscated JavaScript, compiled binaries, and encrypted protocols to understand hidden functionality.
API Security Testing
Finding and exploiting API vulnerabilities, from broken authentication to excessive data exposure.
Quick Facts
Get to know the person behind the code
Location
Berea, Ohio
remote-first
Tools
IDA Pro, Ghidra, Burp
reverse engineering
Languages
JS, Python, Go
full-stack development
Focus Areas
Anti-Bot Systems, Reverse Engineering
security researcher
Research Highlights
"Don't worry about failure; you only have to be right once."
- Drew Houston, CEO of Dropbox
My Skills
Technologies and tools I use to bring ideas to life
Tools Knowledge & Experience
Bot Detection Bypassed
Programming Languages
Fingerprinting Techniques
Tools & Technologies
Continuous Research
Security evolves constantly as new detection methods emerge. I actively research the latest bot detection systems, analyze new obfuscation techniques, and try to develop novel bypass methods. I focus on understanding and documenting these systems to learn how the battle field is changing every day
My Experience
A timeline of my professional journey and education
Software Engineer
Metrosmoke
Shopify-backed POS & warehouse flow, built for real-time ops. The challenge? Price & inventory updates lagged and paper pick-lists caused errors during rush hours. I rebuilt the product sync around Shopify's APIs, designed a lightweight picking UI, and containerized everything with one-click deploys. Now releases happen whenever we need them, updates feel instant at the register, and picking accuracy has noticeably improved. Docker + Git-based CI/CD means rollbacks take minutes, not hours.
Network Engineer
Oxheberg LLC
Kept a small KVM fleet stable under pressure. When spiky traffic led to resource contention and crypto-mining attempts started appearing, I stepped up to tune the KVM hosts and harden our iptables rules. Built DDoS-resistant firewall policies with traffic shaping, created playbooks for incident response, and set up monitoring to catch anomalies early. The result? Fewer incidents, faster remediation, and predictable performance for production workloads.
B.S. in Computer Science (Cybersecurity Focus)
Ohio State University
Diving deep into the academic side of cybersecurity while actively applying concepts to real-world bot detection challenges. Currently tackling Software Development I & II alongside Linear Algebra through remote learning. What makes this interesting is how theoretical concepts from class directly inform my security research - understanding data structures helps me reverse engineer obfuscated code, while algorithm analysis improves my approach to bypassing detection systems.
My Spotify 🔥
Real-time Spotify API integration showcasing currently playing tracks and listening history. A live demonstration of OAuth authentication and REST API consumption.
Not currently listening to anything