about me
I'm Yonathan Gashu.
I work on exploit development and reverse engineering. Most of my time is spent in disassemblers, debuggers, and reading way too much assembly. I've done exploit development work at the Department of Defense and I'm currently researching binary similarity with the Cyber-Physical Security Lab at Georgia Tech.
When I'm not breaking binaries, I love playing bass, skateboarding, snowboarding, and spending time with my cat Joey.
experience
Department of Defense
Capabilities Development Specialist
May 2025 - August 2025
Department of Defense
Artificial Intelligence Research Intern
May 2024 - August 2024
Department of Defense
Software Engineering Intern
September 2022 - August 2023
Verizon
System Developer Intern
July 2022 - August 2022
projects
Independent security analysis of a commercial IP camera. Obtained root access via UART and U-Boot manipulation, documenting attack surface across firmware, network services, and hardware interfaces.
An encrypted long-range wearable messaging device for remote areas using LoRa radio technology. Built using no-std Rust/Embassy on an RP2350.
2.5D raycasting engine implemented from scratch in C++ with SDL2, using ray-wall intersection and distance-based projection for real-time rendering.