About Me

By 0xh4ty

Welcome

I’m 0xh4ty, a systems programmer and security researcher focused on understanding how systems behave, where they fail, and how they can be broken.

This blog is a record of that exploration. It covers security research, reverse engineering, blockchain systems, and the design and implementation of low-level and distributed systems. The goal is not just to use systems, but to understand them deeply enough to reason about their behavior under real constraints.

Path

I started in Web2 security and spent a couple of years building a foundation in penetration testing and web exploitation. During this time, I earned the HTB Certified Web Exploitation Specialist (CWES) certification and developed a working understanding of common vulnerability classes and exploitation patterns.

Over time, I structured my learning to build intuition across layers of abstraction, moving from higher-level systems toward lower-level and more complex environments:

Web application security -> Web3 security (Ethereum) -> Rust programming -> Web3 security (Solana) -> Reverse engineering -> Distributed systems engineering

Each transition increased both complexity and depth. The progression moved from exploiting application logic, to reasoning about on-chain state machines, to writing systems code, to analyzing compiled binaries, and finally to designing systems that must remain correct under concurrency, failure, and adversarial conditions.

I am currently pursuing a Master of Computer Applications (MCA), while continuing to focus heavily on hands-on systems work outside of formal coursework.

Work

My work sits at the intersection of systems and security, with an emphasis on understanding failure modes and building intuition through direct interaction with real systems.

I focus on depth over breadth. The goal is to understand invariants, constraints, and edge cases rather than relying on surface-level patterns.

Approach

I treat systems as artifacts that can be taken apart and studied. This involves reading code, tracing execution, inspecting memory layouts, and rebuilding simplified models to verify understanding.

Whenever possible, I prefer:

This approach helps build intuition that transfers across domains such as security, distributed systems, and low-level programming.

Tooling

My tooling choices are driven by control, visibility, and the ability to inspect system behavior closely.

Current Focus

My current focus is distributed systems engineering.

This includes building and understanding systems that deal with state replication, consistency, failure handling, and coordination across nodes. I am particularly interested in how these systems behave under partial failure and adversarial conditions.

Alongside this, I continue to work on:

Contact


This blog exists to document my journey in systems programming and security research and to share what I learn along the way.

If you are working on similar problems or following a similar path, feel free to reach out.