Skip to content
View jackhax's full-sized avatar
πŸŽ“
Graduate Student at NYU
πŸŽ“
Graduate Student at NYU

Highlights

  • Pro

Block or report jackhax

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
jackhax/README.md

πŸ‘¨β€πŸ’» About Me

Hey! I'm Adnan Jakati!

I'm an Offensive Security Researcher and Cybersecurity grad student at NYU, passionate about hands-on, high-impact work. From reverse engineering firmware to building autonomous red team tools, I love diving deep into security problems and creating powerful solutions.

πŸ” I specialize in penetration testing, reverse engineering, and threat detectionβ€”whether it's cracking encrypted configs in router firmware or designing LLM-based recon agents for Hack The Box.

πŸ’¬ I like to think of myself as a curious hacker, someone who’s always learning, building, and breaking things (responsibly, of course).

Fun fact: I once broke a classifier’s accuracy by 70% with adversarial attacks. 😈


πŸ“Š GitHub Activity

GitHub Streak


πŸŽ“ Education

New York University

M.S. in Cybersecurity | Expected May 2025
Courses: Application Security, Offensive Security, Applied Cryptography, Software Supply Chain Security

KLE Technological University

B.E. in Computer Engineering | Graduated May 2022


πŸ’Ό Experience Highlights

πŸ”¬ Offensive Security Researcher – NYU Center for Cybersecurity

Sept 2023 – Present Β· New York, NY

  • Reverse-engineered TP-Link firmware to uncover 5 attack vectors
  • Cracked DES-encrypted config files with custom decryption logic
  • Conducted deep static analysis with Ghidra over 10K+ lines of assembly

πŸ” Security Engineer – Sony India

Aug 2022 – Aug 2023 Β· Bangalore, IN

  • Built a honeypot-based threat detection system that cut response time by 50%
  • Launched adversarial attacks on ML models, dropping accuracy by 70%
  • Delivered early-stage TDR capabilities using real-world threat simulation

πŸ›  Projects That I Love

  • Autonomous Recon Agent: LLM-powered red team automation framework chaining 40+ tools
  • Honeypots + Splunk: Detected 50+ real-world attacks from 20+ countries over AWS tunnels
  • Firmware Reversing: Gained root access by exploiting GOT entries via custom Python payloads

🧠 Skills

Languages: Python, C++, JavaScript, SQL
Security Stack: Ghidra, Metasploit, Burp Suite, Nmap, Wireshark, Splunk, sqlmap, Hydra, Zap
Cloud/DevOps: AWS, Azure, Docker, Kubernetes, CI/CD, Lambda
Frameworks: Flask, Node.js, REST APIs, pwntools
Databases: MongoDB, MySQL, DynamoDB, Firebase
Specialties: Reverse Engineering, Secure Code Review, Web App Pentesting, Threat Modeling


🀝 Connect with Me

LinkedIn
πŸ“§ Email: [email protected]
πŸ”— My Recon Agent β€’ My Notes


Thanks for stopping by β€” feel free to reach out if you want to build, break, or brainstorm something cool πŸ”πŸ’‘

Pinned Loading

  1. Hawx-Recon-Agent Hawx-Recon-Agent Public

    Hawx Recon Agent is an intelligent, autonomous reconnaissance system powered by a Large Language Model (LLM). Designed for offensive security workflows, it automates initial triage and guided follo…

    Python 20 6

  2. OllamaRex OllamaRex Public

    Forked from moyix/gpt-wpre

    Whole-Program Reverse Engineering with Ollama

    Python