Parsia's Den

The knowledge of anything, since all things have causes, is not acquired or complete unless it is known by its causes. - Avicenna

Who am I?

I am Parsia Hakimian. Current (mostly) Senior Security Consultant at Synopsys Software Integrity Group based out of the DC area in United States.

This is mostly my own security research and notes. This doubles as my cheat sheet and knowledge base. A few times a day I look articles up on this website or send links to others.

These days I mostly work on thick client/reverse engineering assessments, web and mobile applications (Android, iOS and even Windows mobile). My current research interests are Golang, Distributed Ledgers and Transactions (aka blockchain and smart contracts) security, embedded devices, binary instrumentation and in-memory fuzzing.

Below is my relevant experience:

Senior Security Consultant @ Cigital/Synopsys - Feb 2016 to Present

Cigital joined Synopsys Software Integrity Group (SIG) in December 2016.

  • Learned how to interpret and reverse engineer custom network protocols, make sense of random binary blobs and proxy almost any Windows thickclient.
  • Got better at debugging, reverse engineering, function hooking and, reading x86/AMD64 Assembly and memory dumps.
  • Tested some IoT devices, mainly PowerPC and ARM. Learned how to read some ARM and PPC Assembly.
  • Created and maintained the .NET thick client runbook. The one-stop-shop for learning .NET thickclient assessments.
  • Kept developing tools (mostly Python and some in Go) to automate things.
  • Did Web and mobile application testing when other projects were not available.

Security Consultant @ Cigital - Sep 2014 to Feb 2016

  • Started doing Android application tests and then added iOS, BlackBerry and Windows Mobile to the mix.
  • I was Technical Advocate for Cryptography in Cigital’s computer-based training courses. I reviewed courses and provided feedback on errors and helped updated anything crypto in various courses.
  • Started doing thickclient tests. Learned how to proxy applications. Put my assembly knowledge to good use. Used every tool I could get my hands on from Procmon to Wireshark to IDA in order to better understand thickclient applications.
  • Joined the Advanced Penetration Testing practice.
  • Kept developing tools (Python).
  • Continued testing web applications, web services and all things web.

Associate Security Consultant @ Cigital - May 2013 to Sep 2014

  • Started with web applications. Mainly setting up, running and triaging Appscan on a large number of web applications.
  • Moved to manual web application tests. Started using Burp Suite extensively.
  • Did some tooling (Python/Ruby). Reverse engineered the Appscan Standard ”.scan” files and extracted information to triage/log.


  • The Johns Hopkins University - M.Sc. in CS
  • University of Tehran - M.Sc. in IT
  • Iran University of Science and Technology - B.Sc. in Computer Software Engineering