🔐 Security Researcher | 🧩 Reverse Engineering | 🕷️ Penetration Testing | ⚙️ Agentic Security Tooling
I break systems only where I have authorization, then turn the evidence into root cause, impact, and practical fixes.
Currently deep in reverse engineering, exploit research, offensive-security labs, and AI-assisted tooling for faster security workflows.
- 🏝️ vibe-island - A Dynamic Island for AI coding tools; cross-platform desktop UX in Rust.
- 🩹 void-patcher-cc - Reverse-engineering notes and patch automation around Claude Code CLI bundles.
- 🛰️ omniwire - Infrastructure layer for AI-agent swarms, MCP tooling, browser control, 2FA, VPN, and firewall experiments.
- 🧰 UltraBuild - Cross-platform agentic harness for models, agents, and OS automation.
- 📓 re-notes - Reverse engineering and security research notes.
- 🧪 Vigilo - Web3 security research fork for bug bounties, audit contests, and exploit reasoning.
- 🤖 Decepticon - Autonomous red-team testing lab fork for authorized workflow experiments.
- Reverse engineering - Binary triage, patch diffing, runtime analysis, and trust-boundary mapping.
- Penetration testing - Web/API testing, attack-surface discovery, auth/access-control review, and remediation validation.
- Exploit research - Crash triage, safe PoC validation, fuzzing signals, and exploitability review in isolated labs.
- Security audits - Evidence-driven findings with reproduction steps, impact, risk, and fixes engineers can ship.
- Agentic workflows - Building tools that make security research faster while keeping scope, safety, and logs clear.
- TryHackMe Top 1%.
- Public work across reverse engineering, security automation, and AI-assisted developer tooling.
- Focused on responsible disclosure, authorized testing, and reproducible evidence.
Scope first. Evidence always. Root cause over symptoms. Fixes that can actually ship.
Random Facts
- I like tools that make security research repeatable.
- I prefer clean repro steps over vague vulnerability claims.
- I spend a lot of time in terminals, debuggers, disassemblers, proxies, and agent harnesses.
- I am not available for unauthorized access, credential theft, spam, or destructive activity.





