- No degree. No buzzwords.
- Just 12+ years of real experience, broken systems, deep debugging, and bottom-up learning.
- I live in the low-levels: C, assembly, custom Linux, and bare metal.
- Everything I run, I build or control—end to end.
If it’s a black box, I break it open.
If it’s noisy, I silence it.
If it's slow, I rewrite it.
- OS Internals: Kernel-level learning through rebuilding
- Cybersecurity: Custom hardened distros, secure sandbox environments, full trace monitoring
- Reverse Engineering: Analysis of obfuscated behavior, tooling, low-level patching
- Virtualization: Custom VMs, optimized isolation environments
- C Programming: Memory, pointers, segmentation — from nothing to everything
- Open Source Dev: I don’t just use tools. I build them.
- Automation: Task schedulers, cleaners, service enforcers — all built from scratch
My homelab is not just for play. It’s an active security ecosystem I designed and built.
- Built my own threat detection, alerting, and automated countermeasure system
- Logs are parsed, analyzed, correlated — acted upon
- Not reliant on vendor software — I write my own daemons
- Each machine monitored, each process validated
- Periodic scanners, surface analysis, port surveillance
- Built using:
C,shell,Rust,Linux,custom agents,crontab,iptables,fail2ban,auditd
- Open Source first – Everything I build is meant to be given back
- Simplicity wins – Code should be minimal, secure, efficient
- Respect is earned – Through code quality, not titles
- I aim to build tools that help other devs work better
- Long term: I just want to maintain good OSS, nothing else
C Rust Bash Python PHP TypeScript
Linux Proxmox Docker KVM Electron Laravel Vue.js
iptables fail2ban suricata auditd rkhunter clamav custom agents
PyTorch TensorFlow Solidity Web3.js
- Writing a basic OS in C
- Hardened Linux environments
- Memory manipulation and protection
- Building minimalist CLI tools
- Cyber forensics and logging intelligence
- 📧 [email protected]
Control the system, or be controlled by it.







