Hi, I’m Andrew Haberlandt!


I sometimes work on software security.

I like fuzzing, symbolic execution, reverse engineering, and SMT solvers. I also like trains.

I currently play CTF with the Plaid Parliament of Pwning, and occasionally I write-up my solutions on my blog, fastb.in.


Email: