CyberSecurity Student & Researcher
I am a Cybersecurity Student and Researcher operating at the intersection of low-level system design and high-level adversarial concepts. I believe real security requires a deep, foundational understanding of how systems fail.
My academic focus lies in analyzing complex architectures to find critical flaws. I am constantly learning and exploring new ways to secure digital infrastructure through rigorous research.
1. Download public key:
LeonardoSpadoni.asc2. Import to your keyring:
Studying Red Teaming methodologies, Advanced Persistent Threat (APT) concepts, and Web/API Enumeration.
Researching SIEM architectures, Threat Hunting concepts, and incident response frameworks in academic lab environments.
Exploring AWS/Azure security best practices, container hardening, and the principles of immutable infrastructure.
Focusing on low-level programming in Go, Python, and Rust. Building secure-by-design academic projects.
University of Salerno • 2024
University of Rome "La Sapienza" • In Progress
INE Security • Achieved
OffSec • In Progress
Universitat de València • 2026
INE Security • Achieved
OffSec • In Progress
Universitat de València • 2026
Theoretical knowledge and practical application in key cybersecurity domains.
Identifying and exploiting vulnerabilities across external and internal perimeters using advanced adversarial methodologies.
Crafting custom payloads and researching memory corruption, binary exploitation, and low-level software vulnerabilities.
Securing AWS/Azure infrastructures, conducting cloud penetration tests, and analyzing container orchestration vulnerabilities.
Reverse engineering compiled binaries and analyzing malicious software behavior using static and dynamic analysis techniques.
Handling security breaches, containing threats, and performing forensic analysis to understand the scope of compromise.
Proactively searching through networks and endpoints to detect and isolate advanced threats that evade traditional security solutions.
Delivering end-to-end engineering and offensive security assessments for modern infrastructure.
Architecting and building secure, scalable, and high-performance web applications. From modern frontends to robust backend APIs and database designs.
Cross-platform and native mobile application development with a security-first approach to protect user data and prevent reverse engineering.
Simulating sophisticated cyber attacks on your infrastructure and applications to uncover critical exploitable vulnerabilities.
Systematic scanning and manual verification of your digital assets to identify, quantify, and prioritize security weaknesses.
Comprehensive source code review, architecture analysis, and compliance checks to ensure robust defense-in-depth strategies.
A deep dive into the underlying mechanics of CVE-2021-44228, network indicators, and robust mitigation strategies.
Discovering MalwareCnn: Applying Convolutional Neural Networks to the analysis and classification of malware by converting binaries to images.
My inbox is open for new opportunities, consulting requests, or challenging contracts. Communication is strictly confidential.
Send me an email directly. For highly sensitive information, please use my PGP key to encrypt your message payload before transmission.