About

About

➑️ About πŸ§‘πŸ»β€πŸ’»

Hi! I’m Shreyas Penkar, an Android/Browser Vulnerability Researcher, Computer Engineer and a keen Programmer πŸ˜„

As a passionate vulnerability researcher, I thrive on unraveling the intricate layers of system internals and uncovering hidden flaws that lie beneath. With a strong foundation in Android kernel and driver VR, cross-architecture debugging, and a deep curiosity for how things break β€” and why β€” I enjoy pushing boundaries in vulnerability discovery and analysis. Whether it’s dissecting Android drivers, exploring codebases, or probing V8 internals, I’m driven by the art and science of security research and the constant pursuit of deeper technical mastery.

➑️ Security Research Skills 🧠✨

[βž•] Android/Browser Security Expertise
[βž•] Experience in Android/Browser N-Day Research, Vulnerability Analysis, Triaging, and Exploitation
[βž•] In-depth Knowledge of Android OS Internals and NDK System Programming
[βž•] Familiarity with ARM, Intel, MIPS, and Basic Hexagon Architectures
[βž•] Knowledge of KGSL and ARM Mali GPU VR (and kernel drivers like - cvp,adsprpc)
[βž•] Linux System and Kernel Driver Programming
[βž•] Experience in V8, Chrome Internals, and V8 Type Confusion Bug Analysis & Fuzzing
[βž•] Foundational Knowledge in MediaTek and Shannon Baseband Research
[βž•] Proficient in Programming Languages: Python, Java, C/C++, and Rust

Check out my Social Handles on the Left Bottom if you wish to connect!