Skip to content
View kundurz's full-sized avatar
🧨
arguing with ASLR
🧨
arguing with ASLR

Block or report kundurz

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
kundurz/README.md

Hi, I’m Linus Kundur-Zourntos

I’m a second-year Computer Engineering student at the University of Toronto with a strong interest in systems security, binary exploitation, and low-level software design.

My work centers on understanding how software fails at the lowest levels and how to design systems that are harder to break.

Most of what I build and analyze is in C, C++, and assembly, with an emphasis on:

  • memory safety and allocator internals
  • binary exploitation primitives (stack/heap overflows, UAF, control-data corruption)
  • OS and hardware–software security mechanisms
  • exploit mitigation design (canaries, quarantines, W^X, resource limits).
  • practical exploit techniques and mitigations
  • CPU microarchitecture

🛠️ Programming Languages


  
  

🔧 Current Focus

  • Binary exploitation fundamentals, with an emphasis on heap and stack misuse
  • Designing and analyzing memory allocators for security and robustness
  • Building low-level systems software in C/C++ (shells, runtimes, execution models)
  • Understanding calling conventions, ABIs, and program behavior at the assembly level
  • Exploring exploit mitigations across software and hardware (canaries, W^X, sandboxing)
  • Studying CPU microarchitecture and its interaction with software security

📁 Selected Projects

  • AURION-5 — A softcore 5-stage pipelined processor implementing the classic IF/ID/EX/MEM/WB pipeline, with hazard detection and control/data path design explored through simulation and testing.

  • shsh — A command-line shell implemented in C supporting built-in and external commands, input/output redirection, and Unix process execution via fork/exec.

  • blockfit — Built a minimal heap allocator in C using fixed-size blocks, explicit metadata, and first-fit contiguous allocation.

  • Pong (Computer Opponent) — A Pong game where the player competes against an computer-controlled paddle that tracks and intercepts the ball, demonstrating real-time game logic and control flow.


🧠 What I Care About

  • Learning systems deeply by building and breaking them
  • Developing a strong mental model of vulnerabilities and why they occur
  • Understanding exploitation at the level of memory layout, control flow, and ABI behavior
  • Building systems software (allocators, shells, processors) as a way to study how real systems work

📫 Contact

If you’re interested in systems security, low-level engineering, or research-oriented projects, feel free to reach out.

Pinned Loading

  1. AURION-5 AURION-5 Public

    Custom 32-bit pipelined processor with hazard detection, ALU, and integrated peripherals.

  2. blockfit blockfit Public

    A minimal heap allocator using fixed-size blocks and explicit metadata, backed by mmap.

    C

  3. pong pong Public

    Remake of the well-known pong game, using SDL2 library for graphics.

    C

  4. shsh shsh Public

    A basic shell program implemented in C

    C

  5. simon-says simon-says Public

    A simple Simon Says game using an Arduino UNO

    C++

  6. snowball-rush snowball-rush Public

    Snowball Rush is a game where the player (a snowman) must catch snowballs to prevent themselves from melting, while avoiding rocks that take away their lives.

    Python