You like that, huh?

Would you like some help on this one?

Enable Gyroscope

On iOS devices, manual Gyroscope permission is required to enable motion controls for the globe visualization.


RAFET ABBASLI

Offensive Security Researcher Senior Software Engineer

View my public resume

Philosophy behind my work

Principles that guide my approach to security research and software engineering.

(Tap on cards to expand)

Zero Trust Security

Assumptions are the mother of all mistakes. I design systems that verify everything, trust nothing, and minimize attack surfaces.

Complexity Reduction

Complexity is where vulnerabilities hide. I fight bloat to keep systems auditable, maintainable, and inherently secure.

Automation First

Human labor is error-prone. I automate repetitive tasks to ensure consistency, reduce mistakes, and free up time for creative problem-solving.

Evidence-Based Decisions

Heuristics is exploitable. I trust logs, metrics, and Proof-of-Concepts (PoCs) over gut feelings to guide my architectural and security choices.

Performance is not Optional

Whether I design for millions of users or a niche audience, I prioritize speed and efficiency to deliver seamless experiences.

Modular Architecture

Monoliths get messy. I build systems with interchangeable components to enhance flexibility, scalability, and ease of maintenance.

Looking for proof of my skills?
Check out my write-ups about my discoveries.

5s

Stuff I've built & researched

Security research, infrastructure engineering, and the occasional rabbit hole.

Advanced WAF Evasion & Anti-Fingerprinting

Reverse engineering Cloudflare Turnstile, Google reCaptcha (v2/v3/invisible), and DDoS-Guard to automate data collection in hostile environments.


AutomationReverse EngineeringWAF EvasionCDP InjectionCaptcha Bypassing

The Why: Targeted threat communities actively weaponize anti-bot technology (CAPTCHAs, Proof-of-Work) to hide their data. Standard scrapers fail here; if you can't bypass the gate, you gain no intelligence.

The How: I moved beyond WebDriver to direct CDP (Chrome DevTools Protocol) injection for stealth automation. For reCAPTCHA, I built a standalone solver endpoint achieving 0.9+ confidence through behavioral pattern replication. The harder problem was proprietary obfuscated PoW challenges. I reverse engineered multiple cryptographic proof-of-work implementations to extract the validation logic and replicate it server-side.

The Challenge: Bypassing the check is only step one. The real hurdle is preventing chain-bans in a distributed system. I engineered a custom Session Rotator with distributed locking (Redis/ZooKeeper) that ensures accounts are only 'checked out' by one worker at a time, preventing concurrent usage flags.

Automated Mobile Malware Detection Pipeline

A high-concurrency watchdog for monitoring unauthorized application distribution across unregulated third-party stores.


Malware AnalysisMobSFAPK DecompilationPattern MatchingFFI

The Why: When modified banking or telco apps circulate on grey markets, they bypass business logic and compromise users. We needed to detect these 'mods' the moment they were uploaded.

The How: I built a pipeline that scrapes 30+ shadow app stores for both APK/IPA binaries and structured metadata (version history, permissions, developer info). For official Play Store data, I ported EEF's rs-google-play (a Rust-based reverse-engineered Google Play API) to Python using PyO3 and Maturin. The collected files feed into an automated SAST engine (MobSF) for binary decompilation and diff analysis against official releases.

The Challenge: Ironically, poorly developed websites are harder to scrape than secure ones. Shadow stores often have broken HTML, non-standard DOMs, and anti-hotlinking measures. The difficulty wasn't just the scale; it was writing parsers robust enough to handle the chaos of the grey web.

Threat Intelligence Ingestion Infrastructure

Processing terabytes of unstructured data from leak sites and dark web forums into structured, queryable intelligence.


Dark Web MonitoringData NormalizationProtobufOSINT

The Why: Raw data from the dark web is useless if it isn't searchable. We needed a way to correlate a handle on a Russian forum with a database leak on a file-sharing site instantly.

The How: I architected a modular ingestion engine using RabbitMQ and ZooKeeper to handle the throughput. Crucially, I enforced strict schema validation using Protocol Buffers (Protobuf). This forces unstructured forum HTML into a strict binary format, making the data immutable and typed before it hits our Data Lake.

The Challenge: Forums built on the same underlying frameworks (XenForo, phpBB, vBulletin) share DOM structures but implement custom anti-scraping logic. I wrote modular parsers that inherit base extraction logic per platform type, reducing code duplication significantly. The real challenge is handling unreliable data: missing fields, inconsistent encodings, malformed timestamps. The system validates and normalizes on ingestion, logging failures for manual review rather than silently corrupting the dataset.

Secure Infrastructure Tooling (Golang)

Developing secure, self-hosted alternatives for sensitive internal operations using Go.


GolangSecure CodingCryptographyClean Architecture

The Why: Using public tools (like Pastebin) for internal security operations is an OPSEC failure. We needed a fast, internal, air-gapped solution for sharing sensitive payloads and configs.

The How: I wrote 'Pasty', a high-performance storage engine in Go. To minimize maintenance, I architected it to be database-less; it uses S3 object metadata for state management. This allows us to spin up instances instantly via Docker without managing complex SQL migrations.

The Challenge: Simplicity shouldn't compromise functionality. I implemented a full GUI and API interface that supports advanced security features like 'Burn-After-Read', password protection, and auto-expiration purely via metadata logic.

Summary of my technical skills

A quick overview of the tools, technologies, and methodologies I employ regularly.

DISTRIBUTED SYSTEMS ARCHITECTURE
HIGH-PERFORMANCE PYTHON
RUST & GO
THREAT INTELLIGENCE PIPELINES
EVENT-DRIVEN INFRASTRUCTURE
RABBITMQ
REDIS
DOCKER (PODMAN)
KUBERNETES
POSTGRESQL
ELASTICSEARCH
MONGODB
AWS S3
ANSIBLE
GITHUB ACTIONS
SECURE SDLC
DISTRIBUTED SYSTEMS ARCHITECTURE
HIGH-PERFORMANCE PYTHON
RUST & GO
THREAT INTELLIGENCE PIPELINES
EVENT-DRIVEN INFRASTRUCTURE
RABBITMQ
REDIS
DOCKER (PODMAN)
KUBERNETES
POSTGRESQL
ELASTICSEARCH
MONGODB
AWS S3
ANSIBLE
GITHUB ACTIONS
SECURE SDLC
OFFENSIVE SECURITY RESEARCH
ADVANCED ANTI-BOT EVASION
BURP SUITE
FRIDA
REVERSE ENGINEERING
BROWSER INSTRUMENTATION (CDP)
BINARY NINJA
APK STATIC ANALYSIS
CAIDO
REQABLE
WIRESHARK
MITM PROXY
DRISSIONPAGE
KERNELSU & LSPOSED
API SECURITY BYPASSING
MOBSF
OSINT & DIGITAL FOOTPRINTING
OFFENSIVE SECURITY RESEARCH
ADVANCED ANTI-BOT EVASION
BURP SUITE
FRIDA
REVERSE ENGINEERING
BROWSER INSTRUMENTATION (CDP)
BINARY NINJA
APK STATIC ANALYSIS
CAIDO
REQABLE
WIRESHARK
MITM PROXY
DRISSIONPAGE
KERNELSU & LSPOSED
API SECURITY BYPASSING
MOBSF
OSINT & DIGITAL FOOTPRINTING
ARCH LINUX
HYPRLAND
ZSH + STARSHIP
ALACRITTY
ASTRO
HTMX
THREE.JS
WEBGL & GLSL
RIPGREP
HTTPIE
JQ
YAAK
BEEKEEPER STUDIO
MACOS
NOTESNOOK
FX
DMS
SVG ANIMATION
ARCH LINUX
HYPRLAND
ZSH + STARSHIP
ALACRITTY
ASTRO
HTMX
THREE.JS
WEBGL & GLSL
RIPGREP
HTTPIE
JQ
YAAK
BEEKEEPER STUDIO
MACOS
NOTESNOOK
FX
DMS
SVG ANIMATION

Coded for this year

I'm a polyglot developer. Here's a breakdown of the top programming languages I've used this year.

Language Time spent Percentage
00 languages in total