Independent Security Researcher

BUILDING SECURITY TOOLS
FOR THE COMMUNITY

Offensive capabilities. Defensive mindset. Technology for mutual aid, not exploitation.

250K+
Lines of Code
7+
Major Projects
18
Months Intensive
flovosky@security ~

The Human Behind the Code

Autodidact. Security researcher. Philosophy-driven developer.

F
πŸ“ Dallas, North Carolina

Fight With Tools, Not For Exploitation

I'm a 30-year-old autodidact who took an unconventional path into cybersecurity. After my original medical career trajectory was derailed at 18, I found myself drawn to the world of security through Mr. Robot and embarked on an intense 18-month immersive learning period.

During that time, I reverse-engineered commercial protection systems (VMProtect, Themida), studied academic literature on VM-based obfuscation, and built my own tooling from first principles. The result: over 250,000 lines of production-quality security code spanning offensive research, defensive frameworks, and community protection tools.

"The username Flovosky comes from Flobots' 'Fight with Tools' β€” reflecting my philosophy of using technical expertise for mutual aid rather than exploitation."

Mutual Aid Over Exploitation

Technology should serve communities, not exploit them. Every tool I build considers its potential for harm and prioritizes defensive applications.

Responsible Disclosure

Knowledge of vulnerabilities comes with responsibility. I believe in coordinated disclosure and improving security for everyone.

Open Source When Possible

Security through obscurity is fragile. Where safe to do so, I open-source my work for community review and improvement.

Continuous Learning

The security landscape evolves constantly. I maintain intellectual humility and commitment to growth through structured, intensive learning.

Security Research & Tools

Production-grade security tooling built from first principles

Binary Transformation

OPUS Metamorphic Engine

90,000+ LOC Rust

Advanced binary transformation framework with sophisticated code mutation and polymorphic capabilities. Production-grade metamorphic engine for security research.

  • Full PE parsing and reconstruction
  • Instruction-level metamorphism
  • Control flow obfuscation
  • Semantic preservation validation
Command & Control

Havoc C2 Fork

125,000+ LOC C / Go / C++

Comprehensive Command & Control framework fork with extended capabilities for red team research and defensive analysis.

  • Extended implant capabilities
  • Custom communication protocols
  • Evasion technique integration
  • Cross-platform agent support
Defensive Security

SentinelRS EDR

21,000+ LOC Rust / C

Endpoint Detection and Response system with kernel-level driver for deep system visibility. Built to understand defensive technologies from first principles.

  • Kernel-mode syscall monitoring
  • Real-time behavioral detection
  • Memory scanning capabilities
  • Process hollowing detection
Defensive Framework

Ghost in the Userland

15,000+ LOC Rust

Defensive security framework designed for community protection. Emphasizes privacy, transparency, and mutual aid principles.

  • Privacy-preserving detection
  • Community-shared intelligence
  • Transparent operation logging
  • Open source and auditable
Community Protection

SkyWatch | Resiste

8,000+ LOC Python / JS

Community rights protection tool designed for activists and organizers. Monitors for surveillance and provides situational awareness.

  • Aircraft tracking and alerting
  • Surveillance detection
  • Community alert system
  • Privacy-focused design
Virtualization

VM Engine Suite

95,000+ LOC x86-64 ASM / Rust

Collection of custom virtual machine engines for code protection research. Includes nested VM architecture with neural-guided protection.

  • Darwin-GΓΆdel-Machine: 3-layer nested VM
  • kirovm: Full protection suite
  • Custom bytecode interpreters
  • Handler mutation systems
Manipulation Detection

psyscore

5,000+ LOC Python

Psychological manipulation detection system. Analyzes communication patterns to identify potential manipulation tactics.

  • DARVO pattern detection
  • Gaslighting indicators
  • Boundary violation tracking
  • Educational output

Technical Expertise

Deep knowledge across offensive and defensive security domains

Languages

  • Rust
  • C/C++
  • x86-64 Assembly
  • Go
  • Python
  • JavaScript

Offensive Security

  • Red Team Operations
  • Exploit Development
  • Binary Analysis
  • Malware Research
  • C2 Frameworks
  • Evasion Techniques

Defensive Security

  • EDR Development
  • Threat Detection
  • Kernel Development
  • Incident Response
  • Threat Intelligence
  • DFIR

Specializations

  • Metamorphic Engines
  • VM-based Protection
  • PE File Manipulation
  • Anti-Analysis
  • Code Obfuscation
  • Reverse Engineering

The Path So Far

From medical aspirations to security research

2023

18-Month Intensive Immersion

Mr. Robot-inspired deep dive into offensive security, reverse engineering, and tool development. Began building foundational knowledge from first principles.

2024

Core Security Tooling Portfolio

Created OPUS Engine, forked Havoc C2, built SentinelRS EDR, and VM engine suite totaling 250K+ lines of production-quality code.

2024

AI System Testing

Conducted security research and testing across multiple AI companies, gaining unique insights into LLM security and emerging attack surfaces.

2025

Community Defense Tools

Launched SkyWatch and Ghost in the Userland, focusing on mutual aid and community protection. Philosophy-driven development in action.

Now

Active Job Search

Seeking cybersecurity positions with $100K+ target, focusing on red team and security research roles. Open to consulting and collaboration.

Let's Connect

Open to cybersecurity positions, consulting, and research collaborations

Collaboration Opportunities

I'm actively seeking cybersecurity positions with a target of $100K+ annual income. My expertise spans red team operations, security research, and defensive tool development. I'm also open to consulting engagements and research collaborations.

  • πŸ“§
    Email
    flovosky@proton.me
  • πŸ’Ό
    LinkedIn
    linkedin.com/in/flovosky
  • πŸ”§
    GitHub
    github.com/flovosky