Available for Internship - Spring / Summer 2026

Percy
Flores

Co-Founder at Prismont AI  |  Master's Candidate at NJIT

8 Projects Completed
3+ Security Domains
6 CTF Labs
NJIT Master's Program
Percy Flores Profile Photo

Building Toward
Enterprise Readiness

I am Percy Flores, a Master's student at the New Jersey Institute of Technology, concentrating in Cybersecurity and Privacy. My journey is defined by a commitment to bridging theoretical knowledge and hands-on, real-world execution.

Currently, I am the Co-Founder & Lead Engineer of Prismont AI alongside Rajwinder Parmer (Network Engineer & MBA candidate), where we are building the definitive governance layer for Enterprise AI, featuring structured adversarial review, policy-aligned execution, and immutable audit trails. Alongside this, I perform intensive cybersecurity lab work, from exploiting network configurations to performing controlled binary exploitation.

I am actively preparing for internship opportunities within Cybersecurity and IT, with a long-term focus on network defense, threat analysis, and secure systems design. My goal is to integrate quickly, meet high engineering standards, and continuously improve to align with the expectations at world-class enterprises.

"I intentionally waited to reach this point - I wanted to present a profile that reflects stronger practical readiness, not just coursework."

Enterprise Cybersecurity and Network Architecture
๐ŸŽ“

Graduate Study at NJIT

Master's program with deep focus in cybersecurity, network protocols, and counter-hacking techniques.

๐Ÿ”

Binary Exploitation & Forensics

6 hands-on CTF-style security labs covering buffer overflows, shellcode injection, ASLR bypass, and digital forensics.

๐ŸŒ

Network Engineering

ARP poisoning, MITM attacks, VLSM subnetting, and multi-router topologies using Wireshark and Cisco Packet Tracer.

โšก

Full-Stack AI Development

Lead Developer on a production AI chatbot (Merck Capstone) using Next.js, AI SDK, and agentic LLM tool-calling.

Tools & Expertise

A practitioner's toolkit - built in the lab, refined through real project execution.

๐Ÿ›ก๏ธ

Cybersecurity

Binary Exploitation (GDB) 88%
Shellcode & Payload Crafting 80%
Vulnerability Assessment 85%
ASLR / SSP / DEP Bypass 75%
GDB ltrace strace Metasploit Return-to-libc NOP Sled
๐ŸŒ

Network Engineering

Wireshark / Packet Analysis 74%
Cisco Packet Tracer (VLSM) 71%
TCP/IP Protocols 75%
Firewalls & Architecture 68%
Wireshark Cisco IOS IPv4/VLSM SSH SMB ARP
โšก

Full-Stack Development

Next.js / React 70%
AI SDK / LLM Tool-Calling 65%
PostgreSQL / Neon DB 58%
TypeScript / JavaScript 74%
Next.js React TypeScript AI SDK Postgres Vercel
๐Ÿ’ป

Systems & Tooling

Linux / Bash Scripting 73%
Python 68%
Git / Version Control 75%
Virtual Machine Environments 86%
Linux Bash Python Git VMware Docker

Hands-On Engineering Work

Every project was executed in a real or controlled environment - no simulations, no shortcuts.

โฌก
Startup Founder Enterprise AI

Co-Founder & Lead Engineer | 2026

Prismont - AI Governance Platform

Architecting and building the definitive governance layer for Enterprise AI. Features structured adversarial review, policy-aligned execution, and an immutable audit trail system.

Next.js AI Multi-Agent Systems Governance Infrastructure
๐Ÿค–
Full-Stack AI

CS 491 - Senior Capstone | Spring 2025

Merck AI Scenario Planning Chatbot

Led development of a production-grade AI chatbot enabling Merck project managers to query Microsoft Project schedules using natural language via 9 custom LLM tool-calling functions.

Next.js AI SDK Neon Postgres Vercel Blob
๐Ÿ“ก
Networking Security

CS 646 - Network Protocols & Security | Spring 2026

ARP Poisoning Attack Lab

Performed a controlled ARP Poisoning (Man-in-the-Middle) attack in a VM environment, intercepting live traffic with Wireshark and proposing enterprise-grade mitigations.

Wireshark ARP/MITM Linux VM Python
๐Ÿ”€
Networking

CS 646 - Network Protocols & Security | Spring 2026

Cisco Multi-Router Network Configuration

Designed and validated a multi-router IP network using VLSM subnetting in Cisco Packet Tracer, correctly assigning addresses across 5 network segments and verifying end-to-end connectivity.

Cisco Packet Tracer VLSM IPv4 Subnetting
๐Ÿน
Cybersecurity

CS 647 - Counter Hacking Techniques | Fall 2025

ASLR + SSP + DEP Triple Bypass - Legolas Lab

Most advanced exploit in the series - simultaneously bypassed all three modern OS defenses using format string leaks for ASLR/canary bypass and a return-to-libc attack to evade DEP.

GDB Format String Return-to-libc ASLR Bypass
๐Ÿ’‰
Cybersecurity

CS 647 - Counter Hacking Techniques | Fall 2025

Shellcode Injection via Buffer Overflow - Sam Lab

Crafted a NOP sled + custom shellcode payload injected through a vulnerable strcpy() buffer to spawn an interactive shell. Calculated precise stack offsets and return addresses via GDB analysis.

GDB NOP Sled Shellcode x86 Assembly
๐Ÿ”
Forensics Security

CS 647 - Counter Hacking Techniques | Fall 2025

Digital Forensics & SSH Exploitation - Pippin Lab

Extracted a hidden SSH private key from 5 layers of nested archives (zip, tar, gzip, bzip2, xz) and leveraged SMB credential harvest to retrieve the target flag.

SSH smbclient Forensics Archive Analysis
๐Ÿ“ฆ
Cybersecurity

CS 647 - Counter Hacking Techniques | Fall 2025

Stack Buffer Overflow - Merry Lab

Overflowed a strcpy() buffer to redirect execution to a hidden getFlag function. Used GDB disassembly to pinpoint the target address and calculate exact 108-byte padding offset.

GDB Buffer Overflow Perl Payload x86
๐Ÿ’ป
Cybersecurity

CS 647 - Counter Hacking Techniques | Fall 2025

Command Injection Exploit - Frodo Lab

Identified an unsanitized system() input in iPrint and exploited it with a backtick-injected payload. Used ltrace/strace for dynamic tracing and sudo enumeration to escalate privileges.

GDB ltrace / strace Command Injection sudo

Documents & Evidence

Every claim on this portfolio is backed by the actual submitted work. Read, download, or verify any report directly below.

1-Page Resume

Percy Flores - Resume

Professional resume summarizing education, technical projects, and core competencies in cybersecurity and software engineering.

โ†“ Download
CS 491 - Capstone

Merck AI Chatbot - Final Paper

Full technical capstone report documenting architecture, tool-calling design, and implementation.

โ†— Open Report โ†“ Official PDF
CS 647 - Command Injection

Frodo Lab - Assessment Report

Command injection exploitation via unsanitized iPrint input. GDB/ltrace/strace dynamic analysis.

โ†— Open Report
CS 647 - Stack Buffer Overflow

Merry Lab - Assessment Report

strcpy() buffer overflow exploit to redirect execution to getFlag. GDB-based address calculation.

โ†— Open Report
CS 647 - Shellcode Injection

Sam Lab - Assessment Report

NOP sled + custom shellcode payload to spawn an interactive shell via strcpy() overflow.

โ†— Open Report
CS 647 - Digital Forensics

Pippin Lab - Assessment Report

Nested archive forensics, SSH key extraction, and SMB credential harvesting.

โ†— Open Report
CS 647 - ASLR+SSP+DEP Bypass

Legolas Lab - Assessment Report

Triple memory protection bypass: format string leak + return-to-libc. Most advanced exploit in the course.

โ†— Open Report

Academic Foundation

Graduate-level coursework at NJIT combining network security, counter-hacking, and engineering capstone projects.

2024 - Present

New Jersey Institute of Technology (NJIT)

Master of Science - Cybersecurity & Privacy

CS 491 Senior Capstone - Merck AI Scenario Planning Chatbot (Lead Developer)
CS 646 Network Protocols & Security - ARP Poisoning, Wireshark, Cisco Packet Tracer
CS 647 Counter Hacking Techniques - Binary Exploitation, Forensics, Memory Attacks

Completed

Bachelor's Degree

Computer Science - Undergraduate Foundation

Core Data Structures, Algorithms, Operating Systems, Computer Networks

Let's Build Something
Together

I am actively seeking internship opportunities in Cybersecurity and IT. Whether you'd like to discuss a role, provide feedback on my work, or simply connect - I'd love to hear from you.

๐Ÿ“ New Jersey, USA  ยท  ๐ŸŽ“ NJIT Master's Candidate  ยท  ๐Ÿ” Cybersecurity & IT Focus