Offensive security research, red teaming, infrastructure and AI security — explored through real-world scenarios.

Vulnerability discovery, 1-day analysis, attack surface mapping, pentesting tradecraft, and tooling experiments — documented as I go. No filler. No recycled theory. If it is here, it was tested, broken, or built.