Aidan Martins

Software Engineer & Cybersecurity Enthusiast

📧 aidanmartins23@gmail.com

📞 416-725-2445

📍 Barrie, Ontario

🔗 GitHub | LinkedIn

🌐 Personal Website

Summary

Software engineer with 18 years of experience in low level programming, reverse engineering, application development and problem solving. Actively working on a password manager, USB forensic tool and reverse engineering tool kit, all developed in Rust. Also participating in Capture The Flag (CTF) competitions to further develop my hands-on cybersecurity skills. Eager to transition into cybersecurity.

Experience

Software / Security Engineer

May 2025 - July 2025

Architected and built a cross platform Electron application with integrated C++ modules for performance critical features, designed a secure end to end licensing system in Django/C++, and implemented robust anti tamper protections to prevent reverse engineering.

Skills used: Electron, C++, JavaScript/Node.js, Django, Python, Reverse Engineering, Security, Obfuscation, API hooking, CI/CD

  • Electron & C++ Interop: Developed the desktop app’s core in Electron (Node.js/TypeScript) while offloading cryptographic and license validation logic into native C++ add-ons for optimal performance and security.
  • Licensing System Architecture:
    • Backend (Django/Python): Designed RESTful endpoints for license generation, activation, validation, and revocation.
    • Client-Side (C++ Module): Created a secure client library to handle license checks, activation workflows, offline validation, and automatic renewal.
  • Anti-Tamper & Anti-Reverse-Engineering:
    • Code Obfuscation & Symbol Stripping: Integrated build time obfuscation for C++ binaries and stripped symbols to hinder static analysis.
    • Runtime Integrity Checks: Implemented checksum and code section hashing routines to detect unauthorized modifications at startup and during runtime.
    • Anti-Debugging & Anti-Hooking: Added debugger presence detection (e.g., IsDebuggerPresent, PE header checks) and API call whitelisting to thwart dynamic inspection and inline patching.

Software Developer

June 2006 - Current

Skills used: C, C++, Rust, C#, Java, Reverse Engineering, React, Astro, Vercel, Docker, Electron, Tauri

  • Designed and implemented a MP3 decoder in Rust, utilizing low-level programming techniques like bitstream processing and unsafe memory manipulation.
  • Developed a real-time task management system with a custom GUI using Egui, featuring independent timers and advanced controls for scheduling.
  • Built a password manager in Rust, focusing on security fundamentals and encryption protocols.
  • Currently working on a personal website using the following technologies: React, Astro, Vercel, Docker.

Education

Cybersecurity Program

Lighthouse Labs

Nov 2024 – Feb 2025

  • Studied cybersecurity principles, CIA Triad (Confidentiality, Integrity, Availability).
  • Hands-on experience with Wireshark, Nmap, and Burp Suite.
  • Trained in penetration testing using Metasploit.
  • Explored malware analysis, digital forensics, and cryptography.

CompTIA Security+ (In Progress)

CompTIA Sec+ Certification

Feb 2025 – May 2025

  • Studying network security, cryptography, and risk management.
  • Gaining knowledge in secure system design and IAM.
  • Practicing vulnerability scanning and mitigation strategies.

Projects

Homelab (2024 - Present)

  • Set up a local server/environment to simulate and monitor attacks.
  • Configured an Intrusion Detection System (IDS) using Snort.
  • Deployed a reverse proxy with Caddy and hosted a Jellyfin media server.
  • Built a segmented machine for malware analysis with IDA, x64dbg, and x86dbg.
  • Practicing exploit research and threat analysis in a controlled lab setup.

Technologies: Snort, Caddy, Jellyfin, IDA, x64dbg, x86dbg

USB Forensics Tool (Ongoing)

  • Developing a Rust-based USB forensic analyzer for tracking device activity.
  • Uses raw packet capture and event logging for security audits.

Reverse Engineering Toolkit

  • Building a custom set of tools for analyzing and reversing software binaries.
  • Includes a DLL injector, debugger hooks, and memory analysis utilities.

Check out my active projects on GitHub.

Certifications & Training

  • CompTIA Security+ (Expected Sept 2025)
  • TryHackMe (Active Participant)
  • Hack The Box (Active Participant)

Skills

Programming Languages

  • Rust
  • Python
  • C++
  • C
  • x86
  • C#
  • JavaScript
  • HTML5

Frameworks & Tools

  • React
  • Node.js
  • Git
  • Docker
  • TypeScript
  • Astro