Hebrew University of Jerusalem • Third Year Student
Third-year Computer Science student at the Hebrew University and former combat intelligence officer. Passionate about Automation, Artificial Intelligence, and Machine Learning, with plans to specialize in these fields through advanced coursework and hands-on projects. Aspiring to be part of the AI and automation revolution and contribute to its advancement.
Visualizing my degree progress, course hierarchy, and prerequisites in an interactive tree.
As the Head Intelligence Officer, I was responsible for planning all of the unit's operational missions, overseeing intelligence gathering and its implementation, providing alerts, commanding the operations room, and more. The roles I undertook strengthened my ability to work under pressure and around the clock, deliver high-standard results, and meet deadlines.
Developed a recommendation system algorithm based on user preferences and historical data.
Implemented a neural network for digit recognition, including data preprocessing and training.
Developed a fun brick-breaking game using OOP principles and interactive design.
Created a 2D world simulator, implementing environment interactions and object dynamics.
Built a generator that converts images into ASCII art using character mapping techniques.
Created a Python version of the classic Boggle game, implementing game logic and board generation.
Analysis of Self-Attention mechanisms and Transformer blocks. Exploring the architecture behind modern LLMs and Positional Encoding.
Researching Multi-Layer Perceptrons. Deep dive into Backpropagation, Activation Functions (ReLU/Sigmoid), and weight optimization.
Foundational supervised learning. Focusing on Gradient Descent optimization, Cost Functions, and binary classification logic.
Analyzing non-linear models and Ensemble methods. Exploring Entropy, Information Gain, and bagging techniques to reduce variance.
Successfully simulated and executed a DNS Cache Poisoning attack within a controlled lab environment. This project demonstrates the exploitation of the DNS protocol's reliance on 16-bit Transaction IDs (TXIDs) to redirect traffic to malicious IP addresses.
Researched and implemented various Script Injection techniques to analyze web application vulnerabilities. The project focuses on bypassing client-side filters and understanding the execution context of malicious scripts.
In-depth research into memory corruption vulnerabilities and exploitation techniques in Linux environments. The study focuses on hijacking the execution flow by overwriting the Return Address to gain EIP/RIP control.
As a former staff officer, I have developed an objective approach to work and problem-solving, and I am an effective advisor to my superiors on various issues, consistently providing high-quality solutions. Additionally, I have successfully undertaken hard and intense roles in the military, demonstrating my dedication, passion for delivering high-quality results on time, and commitment to hard work.