Offensive capabilities. Defensive mindset. Technology for mutual aid, not exploitation.
Autodidact. Security researcher. Philosophy-driven developer.
I'm a 30-year-old autodidact who took an unconventional path into cybersecurity. After my original medical career trajectory was derailed at 18, I found myself drawn to the world of security through Mr. Robot and embarked on an intense 18-month immersive learning period.
During that time, I reverse-engineered commercial protection systems (VMProtect, Themida), studied academic literature on VM-based obfuscation, and built my own tooling from first principles. The result: over 250,000 lines of production-quality security code spanning offensive research, defensive frameworks, and community protection tools.
Technology should serve communities, not exploit them. Every tool I build considers its potential for harm and prioritizes defensive applications.
Knowledge of vulnerabilities comes with responsibility. I believe in coordinated disclosure and improving security for everyone.
Security through obscurity is fragile. Where safe to do so, I open-source my work for community review and improvement.
The security landscape evolves constantly. I maintain intellectual humility and commitment to growth through structured, intensive learning.
Production-grade security tooling built from first principles
Advanced binary transformation framework with sophisticated code mutation and polymorphic capabilities. Production-grade metamorphic engine for security research.
Comprehensive Command & Control framework fork with extended capabilities for red team research and defensive analysis.
Endpoint Detection and Response system with kernel-level driver for deep system visibility. Built to understand defensive technologies from first principles.
Defensive security framework designed for community protection. Emphasizes privacy, transparency, and mutual aid principles.
Community rights protection tool designed for activists and organizers. Monitors for surveillance and provides situational awareness.
Collection of custom virtual machine engines for code protection research. Includes nested VM architecture with neural-guided protection.
Psychological manipulation detection system. Analyzes communication patterns to identify potential manipulation tactics.
Deep knowledge across offensive and defensive security domains
From medical aspirations to security research
Mr. Robot-inspired deep dive into offensive security, reverse engineering, and tool development. Began building foundational knowledge from first principles.
Created OPUS Engine, forked Havoc C2, built SentinelRS EDR, and VM engine suite totaling 250K+ lines of production-quality code.
Conducted security research and testing across multiple AI companies, gaining unique insights into LLM security and emerging attack surfaces.
Launched SkyWatch and Ghost in the Userland, focusing on mutual aid and community protection. Philosophy-driven development in action.
Seeking cybersecurity positions with $100K+ target, focusing on red team and security research roles. Open to consulting and collaboration.
Open to cybersecurity positions, consulting, and research collaborations
I'm actively seeking cybersecurity positions with a target of $100K+ annual income. My expertise spans red team operations, security research, and defensive tool development. I'm also open to consulting engagements and research collaborations.