Red Team Operator specializing in adversary emulation, exploit development, and offensive security research. I focus on simulating real-world attacks to strengthen organizational defenses while conducting research at the intersection of AI and cybersecurity.
Currently researching: LLM reasoning frameworks for automated vulnerability detection and zero-day discovery using deep learning techniques.
Certifications: OSEE | OSED | CRTL | CRTO | OSEP | OSCE | OSCP | CRTE | CRTP | CPTS | CAPE
Focus Areas: Red Team Operations | Binary Exploitation | Reverse Engineering | Malware Development
Research: AI Security | Adversarial ML | Automated Vuln Discovery | LLM Reasoning for SecurityLLM Reasoning Framework - Novel architecture integrating deep-think stages with self-reflection mechanisms directly into LLM hidden states without fine-tuning. Developed during MSc research at IU International University for AI-powered vulnerability detection and code analysis.
Here you'll find:
- π₯ Exploit development tools and custom frameworks
- βοΈ Red team automation and adversary emulation tooling
- π§ͺ Malware analysis and reverse engineering utilities
- π― CTF writeups (pwn, RE, crypto challenges)
- π€ AI security research and proof-of-concepts