about me

I'm Yonathan Gashu.

I work on exploit development and reverse engineering. Most of my time is spent in disassemblers, debuggers, and reading way too much assembly. I've done exploit development work at the Department of Defense and I'm currently researching binary similarity with the Cyber-Physical Security Lab at Georgia Tech.

When I'm not breaking binaries, I love playing bass, skateboarding, snowboarding, and spending time with my cat Joey.

experience

Department of Defense

Capabilities Development Specialist

May 2025 - August 2025

Department of Defense

Artificial Intelligence Research Intern

May 2024 - August 2024

Department of Defense

Software Engineering Intern

September 2022 - August 2023

image/svg+xml

Verizon

System Developer Intern

July 2022 - August 2022

projects

Independent security analysis of a commercial IP camera. Obtained root access via UART and U-Boot manipulation, documenting attack surface across firmware, network services, and hardware interfaces.

hardwarelinuxfirmwarereverse engineering

An encrypted long-range wearable messaging device for remote areas using LoRa radio technology. Built using no-std Rust/Embassy on an RP2350.

embeddedrusthardware

2.5D raycasting engine implemented from scratch in C++ with SDL2, using ray-wall intersection and distance-based projection for real-time rendering.

c++sdl2graphics

skills

Rust

C

Linux

Ghidra

Java