Security Researcher & Developer

Hi, I'm Sebastian Toro

I build low-level systems, break things in CTF competitions, and write code in Rust because life's too short for segfaults you didn't choose.

Scroll
About me

Builder. Breaker.
Curious by default.

I'm Sebastian Toro, and I operate at the intersection of systems programming and security research. The kind of developer who finds joy in understanding how things work three layers deeper than anyone asked.

I got into programming because I wanted to understand computers — not just use them. That curiosity led me down the rabbit hole of low-level programming, reverse engineering, and CTF competitions.

When I'm not hunting vulnerabilities or writing Rust, I'm exploring Elixir and Gleam — because functional programming deserves more love.

Philosophy

Why I do what I do

Security isn't about paranoia — it's about understanding systems deeply enough to know where they break. The best defense comes from knowing the attack.

Quick facts
  • 🦀 Rust is my language of choice
  • 🏴 Active CTF competitor
  • 📝 I write about what I learn
  • 🧪 Always exploring new things
What I do

Three pillars of my work

Each area feeds into the others, making me better at all of them.

🔧

Systems Programming

Building robust, performant software at the lowest levels. Memory management, concurrency, and code that doesn't just work — it works fast.

🔐

Security Research

Reverse engineering binaries, finding vulnerabilities, and understanding how systems fail. Every bug is a lesson.

✍️

Technical Writing

Blog posts and CTF writeups to solidify understanding. If you can't explain it clearly, you don't really know it.

"

The best way to understand a system is to try to break it. The second best way is to build one yourself.

— How I approach every challenge

Tech stack

Languages I speak
(to computers)

Every language shapes how you think about problems. I'm drawn to languages that give you control, expressiveness, or both.

🦀 Why Rust?

Memory safety without garbage collection. Fearless concurrency. A type system that catches bugs before they become vulnerabilities. It's the language I wish I'd had when I was writing C.

Proficiency

Languages & Tools

  • 🦀
    Rust♥ primary
  • 🐍
    Pythonscripting & CTF
  • Csystems & exploits
  • 💧
    Elixirexploring
  • Gleamexploring
Capture the flag

Breaking things, competitively

CTF competitions — where security theory meets practice. Find the flag hidden in the binary, the web app, or the cipher.

pwn
Binary Exploitation
rev
Reverse Engineering
crypto
Cryptography
web
Web Exploitation

🏴 The thrill of the hunt

Hours of staring at assembly, tweaking ROP chains, adjusting offsets — then the flag appears. That dopamine hit is unmatched. I focus on binary exploitation and reverse engineering.

📖 Writeups as learning

After every competition, I write detailed breakdowns. Not just the solution — the thought process, the dead ends, the "aha" moments. Writing forces clarity.

The journey

How I got here

Curiosity → rabbit holes → low-level love → competitive hacking → Rust.

The beginning
First lines of code
Started programming out of pure curiosity. Python was the gateway, but it wasn't long before I wanted to go deeper.
Going deeper
Discovering C
Learning C changed everything. Pointers, memory layout, the stack — suddenly programming was physical and tangible.
The rabbit hole
First CTF competition
The combination of puzzle-solving, reverse engineering, and finding vulnerabilities — everything I loved, concentrated.
The revolution
Falling in love with Rust
Memory safety without GC. A compiler that catches bugs before they become exploits. Like C, but with a co-pilot that cares about correctness.
Now
Building, breaking, writing
Rust systems, CTFs, security research, Elixir & Gleam exploration. The journey's far from over.
Projects

Things I've built

From security tools to systems utilities — software built with intent.

Rust

Security Tooling

Custom tools for binary analysis and exploitation. Built in Rust for speed and safety.

Python

CTF Automation

Pwntools wrappers, solver templates, and exploit primitives that save hours in competition.

Security

Vulnerability Research

Deep-dive analysis of real-world software. Identifying attack surfaces and documenting findings.

C / Rust

Systems Utilities

Low-level utilities: parsers, allocators, OS-level tools — the building blocks everything depends on.

Get in touch

Let's talk

Security questions, project ideas, or just talking about why Rust is the best — I'm always happy to hear from interesting people.

Email
me@storo.ooo
GitHub
@w0nder1ng
🌐
Website
storo.ooo