Research tools, exploitation frameworks, threat intelligence platforms, and CTF infrastructure.
Source code available upon request — reach out to discuss access.
Resilient C2 infrastructure leveraging Tor hidden services for anonymised communications — domain fronting and traffic obfuscation to evade network detection. Privacy-hardened Linux with transparent Tor proxy and OverlayFS-on-tmpfs for zero forensic persistence via RAM-based wiping.
Adversarial testing on LLMs identifying 25+ vulnerabilities in content filtering and safety alignment. Developed novel jailbreaking techniques achieving 80% bypass rate against commercial guardrails. Documented prompt injection vectors for responsible disclosure to AI vendors.
Source code policy: All project source is available upon request for legitimate security research, hiring evaluation, or collaboration purposes.
Reach out at with a brief description of your context.