- No degree. No buzzwords.
- Just 12+ years of real experience, broken systems, deep debugging, and bottom-up learning.
- I live in the low-levels: C, assembly, custom Linux, and bare metal.
- Everything I run, I build or control—end to end.
If it’s a black box, I break it open.
If it’s noisy, I silence it.
If it's slow, I rewrite it.
- OS Internals: Kernel-level learning through rebuilding
- Cybersecurity: Custom hardened distros, secure sandbox environments, full trace monitoring
- Reverse Engineering: Analysis of obfuscated behavior, tooling, low-level patching
- Virtualization: Custom VMs, optimized isolation environments
- C Programming: Memory, pointers, segmentation — from nothing to everything
- Open Source Dev: I don’t just use tools. I build them.
- Automation: Task schedulers, cleaners, service enforcers — all built from scratch
My homelab is not just for play. It’s an active security ecosystem I designed and built.
- Built my own threat detection, alerting, and automated countermeasure system
- Logs are parsed, analyzed, correlated — acted upon
- Not reliant on vendor software — I write my own daemons
- Each machine monitored, each process validated
- Periodic scanners, surface analysis, port surveillance
- Built using:
C
,shell
,Rust
,Linux
,custom agents
,crontab
,iptables
,fail2ban
,auditd
- Open Source first – Everything I build is meant to be given back
- Simplicity wins – Code should be minimal, secure, efficient
- Respect is earned – Through code quality, not titles
- I aim to build tools that help other devs work better
- Long term: I just want to maintain good OSS, nothing else
C
Rust
Bash
Python
PHP
TypeScript
Linux
Proxmox
Docker
KVM
Electron
Laravel
Vue.js
iptables
fail2ban
suricata
auditd
rkhunter
clamav
custom agents
PyTorch
TensorFlow
Solidity
Web3.js
- Writing a basic OS in C
- Hardened Linux environments
- Memory manipulation and protection
- Building minimalist CLI tools
- Cyber forensics and logging intelligence
- 📧 [email protected]
Control the system, or be controlled by it.