This blog documents hands-on research in offensive security, red teaming, infrastructure security, and AI-driven security engineering.

Most articles are built around real technical scenarios: vulnerability discovery, 1-day analysis, attack surface exploration, pentesting case studies, infrastructure misconfigurations, network-level weaknesses, and adversarial thinking applied to modern systems.

I approach security as both an attacker and a builder. Breaking systems is only half the work — understanding architecture, trust boundaries, and operational constraints is what turns findings into meaningful improvements.

AI is a core focus area: not only its security implications (model abuse, prompt injection, agent attack surfaces), but also how AI can augment offensive workflows, improve detection strategies, and enhance security team efficiency.

I enjoy building tooling, automating workflows, and designing infrastructure that supports both offensive research and defensive hardening. Security is not just about identifying flaws — it’s about engineering better systems.

This space serves as a technical lab notebook — documenting experiments, exploitability analysis, tooling development, infrastructure builds, and lessons learned through hands-on research.

No marketing. No surface-level summaries. Just practical security research, adversarial thinking, and continuous building.