Breaking systems to build better defenses. Specialized in exploit development, and offensive security operations.
Open-source tools and security research
A modular payload generation and delivery framework that builds, encrypts, and deploys controlled shellcode for red team simulations and security research.
View Project →Insights, tutorials, and research on cybersecurity
A clear breakdown of how red and blue teams operate in modern cybersecurity, explained through a real-world-inspired scenario. The article shows how attackers exploit small weaknesses, how defenders respond, and why both roles are essential for strengthening an organization’s overall security posture.
Read More →CTF solutions and Machine walkthroughs
No write-ups yet. Check back soon!