Francesco Pompò
Independent IT Security Researcher and Engineer focused on systems programming, malware analysis, and threat intelligence automation.
I’ve been working in the private sector serving both government agencies and commercial clients since 2013.
Usually the focus of my job throughout the years was to develop integrations to ease the workflow of otherwise standalone security software and sometimes to start security products from scratch.
I also have experience as L3 security analyst and malware reverse engineer, where I can quickly respond to threats, perform triage and conduct subsequent analysis.
Since 2013, I have helped organizations design, integrate, and operate security capabilities—often starting from scratch—covering everything from low-level tooling to production-ready workflows.
For a complete overview of my professional background, see my Resume.
I am currently available for consulting engagements in security research, low-level development, and DevOps, both in Italy and remotely.
You can reach me at contact@francesco.cc.
Expertise
- Low-level programming (C / Rust)
- Reverse engineering
- Incident response
- Nix / NixOS
- Containerization and infrastructure abstraction
- Applied cryptography
Projects
| Year | Name | Description |
|---|---|---|
| 2026 | Radar | Hackable and fast network scanner |
| 2025 | Linux Kernel patch | Add SMBIOS fallback method for Apple UEFI firmwares that do not provide it |
| 2025 | AEMT | Tool to interact with Ape Escape’s game files |
| 2025 | Hackshell | Metasploit inspired REPL written in Rust |
| 2024 | Tunnel Madness | Writeup of a reversing challenge from HTB |
| 2017 | libfjson | C JSON parsing library in under 700 LOC |
| 2015 | Lor | Tor Re-implementation PoC using mbedTLS |