About Daniel

Daniel Ishimwe is a Cybersecurity Engineer and a Master's student in Cybersecurity at Université Libre de Bruxelles. His work focuses on understanding systems at a deep technical level, from how they are built to how they can be broken and secured.

Technical direction

Hands-on security work

He has strong interests in offensive security, system security, and post-quantum cryptography. Daniel regularly participates in Capture the Flag competitions and security labs, where he analyzes network traffic, reverse engineers binaries, inspects malicious files, and develops custom scripts to automate investigations. He prefers working close to the protocol and system layer rather than relying only on tools.

Alongside competitions, he builds practical systems. He develops web platforms, internal administrative tools, and security-focused applications. His experience includes Linux server environments, cloud infrastructure, databases, deployment pipelines, and secure application design. He values clean architecture and realistic security practices over theoretical assumptions.

Research and long-term direction

In research, Daniel explores topics such as integrating code-based post-quantum cryptography into existing protocols and evaluating the performance and security impact of cryptographic design choices. He is particularly interested in how advanced cryptographic techniques translate into real-world infrastructure.

His long-term goal is to go beyond the label of "white hat hacker." He aims to master code, systems, hardware, and protocols, and to become someone capable of both breaking and building secure technologies with precision.

Core areas

Offensive security

Breaking systems to understand them precisely

  • Capture the Flag competitions and security labs
  • Network traffic analysis and malicious file inspection
  • Reverse engineering and custom scripting for investigations

Systems and applications

Building practical platforms with realistic constraints

  • Web platforms and internal administrative tools
  • Linux server environments, cloud infrastructure, and databases
  • Deployment pipelines and secure application design

Research

Making advanced cryptography useful in real infrastructure

  • Code-based post-quantum cryptography
  • Protocol integration and implementation tradeoffs
  • Performance and security impact of cryptographic design choices