Hamidreza Moallem Taheri

I'm a trying to learn and experience. So far I've learned a lot of things about cyber security and its branches, like linux, android & windows software reverse engineering, web, network, crypto and ...
I can do reverse engineer on a wide range of linux, android & windows softwares to understand how they work. Now I'm learning about android and the way its apps work.
I'm also familiar with web security and I can analyze the way a web site or API works. at last I know a little about cryptography, but It's enough for analyzing apps and APIs.


Cyber Security Enginner in Dade Pardaz

Design and Implemenet Cyber Security Techniques to Mitigate Risk

I did penetration testing on some web services, network and server infrastructures. now we are working on new cyber security mechanisms to make the compnay safe.

January 2021 – Now

Holding CTF with APA

An Internal IUT CTF

We was prepared for holding this one-day on-site CTF, but the event canceled because of COVID19.

February 2020

Project in IUT APA

Modules Testing & Documenting of Viper Framework

I tested then documented All standard and APA IUT CERT developed Viper Framework modules in Persian (Farsi) as APA needed.

December 2019 – January 2020

Teacher in IUT APA

Reverse Engineering & Exploit Development Course Teacher

I was one of two main teachers of the course. You can see the course topics here: and this is a simple teaching game for this course: A part of course contents


October 2019 – December 2019


Tarbiat Modares University

Master's Degree
Computer Engineering - Cyber Security
Novermber 2021 - June 2023

Isfahan University of Technology

Bachelor's Degree
Computer Engineering - Cyber Security
Project: https://github.com/MrT3acher/4A (Android Application Auto Analysis)
September 2017 - June 2021


Cybersecurity Focuesd (Deeper)
  • Linux & Android Software Reverse Engineering & Exploiting
    • GDB (Linux, Android)
    • Radare2 (Linux)
    • IDA (Android, Windows)
    • Ghidra (Linux)
    • bypassing mitigations like ASLR, NX, Stack Canary, ... (Linux, Android)
  • Software Reverse Engineering & Analysis Frameworks
    • Viper (Linux, Android, Windows)
    • Angr (Linux)
    • Frida (Android)
    • Objection (Android)
  • Cyber Security Standards & Frameworks
    • Web app security
      • OWASP WSTG
      • OWASP ASVS
    • Mobile app security
      • OWASP MSTG
    • Organization security
      • NIST Cybersecurity Framework
      • ISO 27001 Standard
Programming Languages
  • C
  • Python
  • JS / TS
  • C#
  • PHP
  • Selenium Framework
  • Docker & Docker Compose
  • VMware & Virtualbox
Other (Superficial)
  • Network
    • Network+ & CCNA
    • Mikrotik Devices
    • Cisco Devices
    • GNS3 Virtualization
  • Server
    • ESXi
    • LPIC 1 & LPIC 2
  • Developement Frameworks (I know how they work, based on my white-box analysis experience)
    • Django & Flask
    • Laravel & Symfony & CakePHP
    • Express.js
    • AngularJS & JQuery
    • ASP.NET


I like investigating and finding out how something works! This is the cause of choosing reverse engineering among different branches of cyber security.

I like to automate stuffs. I'm too lazy to do something for the second time. So I try to find a way for automating these stuffs. this is the cause of learning Viper, Frida and Angr.


Events I Was a Part Of