CLASSIFIED RESEARCH

Security Arsenal

Declassified case studies from the frontlines of anti-bot bypass research. Demonstrating expertise in reverse engineering and obfuscation analysis.

Advanced Bot Detection

Imperva Incapsula Bypass

Cracked Imperva's reese84 cookie generation by reconstructing their entire client-side validation flow from obfuscated code.

Babel AST parsingJSDOM environmentTLS spoofing+1 more
View Analysis
JavaScript Deobfuscation

PerimeterX Deobfuscator

Built a deobfuscator for PerimeterX's heavily protected JavaScript that reveals their behavioral tracking and WASM integration.

AST transformationControl flow analysisString decryption+1 more
View Analysis
LIVE BROWSER FINGERPRINTING

Who is Watching?

Every website creates a unique profile of your device. See exactly what trackers see when you browse.

Ready to Scan

Click to analyze your browser's unique fingerprint and generate a bot trust score.

Jay - Security Researcher

Hi, I'm Jay

Security Researcher • Reverse Engineer

I dissect bot detection systems and analyze obfuscated code to understand how modern web defenses work. My research focuses on responsible disclosure and developing evasive techniques.

Stats
50+
Vulnerabilities
100+
Systems
15+
Bypasses
200+
APIs
Location

Berea, Ohio

remote-first

Tools

IDA Pro, Ghidra, Burp

reverse engineering

Languages

JS, Python, Go

full-stack development

Focus

Anti-Bot & RE

security researcher

"Don't worry about failure; you only have to be right once."
— Drew Houston, CEO of Dropbox

Security Research

Areas of expertise in offensive security and reverse engineering

Web Application Security

Identifying and exploiting vulnerabilities in modern web apps, from XSS to authentication bypasses.

OWASP Top 10Burp SuiteAPI TestingJWT Attacks

Bot Detection & Evasion

Reverse engineering anti-bot systems like PerimeterX, DataDome, and custom fingerprinting solutions.

JS DeobfuscationTLS FingerprintingBrowser AutomationSensor Data Spoofing

Reverse Engineering

Analyzing obfuscated JavaScript, compiled binaries, and encrypted protocols to understand hidden functionality.

IDA ProGhidraDevToolsAST Analysis

API Security Testing

Finding and exploiting API vulnerabilities, from broken authentication to excessive data exposure.

GraphQL InjectionRate Limiting BypassIDORAPI Fuzzing
50+
Vulnerabilities Found
100+
Systems Analyzed
15+
Fingerprints Bypassed
200+
APIs Tested

My Skills

Technologies and tools I use to bring ideas to life

Expert
Proficient
Learning

Tools & Platforms

Chrome DevTools
Expert
Burp Suite
Expert
Frida
Learning
Ghidra
Learning

Bot Detection Bypassed

Imperva/Incapsula
Expert
PerimeterX
Learning

Languages

JavaScript/TypeScript
Expert
Go
Learning

Fingerprinting

Canvas Fingerprinting
Expert
WebGL Analysis
Expert
Audio Context
Expert
TLS/JA3
Expert

Tools & Technologies

Burp Suite
Wireshark
Git
Docker

Continuous Research

Security evolves constantly as new detection methods emerge. I actively research the latest bot detection systems, analyze new obfuscation techniques, and develop novel bypass methods.

JavaScript DeobfuscationTLS FingerprintingBrowser AutomationCaptcha SolvingRequest Forgery

My Experience

A timeline of my professional journey and education

Work Experience

Software Engineer

Metrosmoke

06/2024 - Present
Brookpark, OH

Shopify-backed POS & warehouse flow, built for real-time ops. The challenge? Price & inventory updates lagged and paper pick-lists caused errors during rush hours. I rebuilt the product sync around Shopify's APIs, designed a lightweight picking UI, and containerized everything with one-click deploys. Now releases happen whenever we need them, updates feel instant at the register, and picking accuracy has noticeably improved. Docker + Git-based CI/CD means rollbacks take minutes, not hours.

ReactNode.jsShopify APIsDockerGitCI/CD
Work Experience

Network Engineer

Oxheberg LLC

01/2023 - 06/2024
Remote

Kept a small KVM fleet stable under pressure. When spiky traffic led to resource contention and crypto-mining attempts started appearing, I stepped up to tune the KVM hosts and harden our iptables rules. Built DDoS-resistant firewall policies with traffic shaping, created playbooks for incident response, and set up monitoring to catch anomalies early. The result? Fewer incidents, faster remediation, and predictable performance for production workloads.

KVMLinuxiptablesNetwork SecurityDDoS Mitigation
Education

B.S. in Computer Science (Cybersecurity Focus)

Ohio State University

Expected 06/2027
Columbus, OH

Diving deep into the academic side of cybersecurity while actively applying concepts to real-world bot detection challenges. Currently tackling Software Development I & II alongside Linear Algebra through remote learning. What makes this interesting is how theoretical concepts from class directly inform my security research - understanding data structures helps me reverse engineer obfuscated code, while algorithm analysis improves my approach to bypassing detection systems.

CybersecuritySoftware EngineeringLinear AlgebraData StructuresAlgorithms

Get In Touch

Send a Message