Zero Trust Security
Assumptions are the mother of all mistakes. I design systems that verify everything, trust nothing, and minimize attack surfaces.
Principles that guide my approach to security research and software engineering.
(Tap on cards to expand)Assumptions are the mother of all mistakes. I design systems that verify everything, trust nothing, and minimize attack surfaces.
Complexity is where vulnerabilities hide. I fight bloat to keep systems auditable, maintainable, and inherently secure.
Human labor is error-prone. I automate repetitive tasks to ensure consistency, reduce mistakes, and free up time for creative problem-solving.
Heuristics is exploitable. I trust logs, metrics, and Proof-of-Concepts (PoCs) over gut feelings to guide my architectural and security choices.
Whether I design for millions of users or a niche audience, I prioritize speed and efficiency to deliver seamless experiences.
Monoliths get messy. I build systems with interchangeable components to enhance flexibility, scalability, and ease of maintenance.
Looking for proof of my skills?
Check out my
write-ups
about my discoveries.
Security research, infrastructure engineering, and the occasional rabbit hole.
Reverse engineering Cloudflare Turnstile, Google reCaptcha (v2/v3/invisible), and DDoS-Guard to automate data collection in hostile environments.
A high-concurrency watchdog for monitoring unauthorized application distribution across unregulated third-party stores.
Processing terabytes of unstructured data from leak sites and dark web forums into structured, queryable intelligence.
Developing secure, self-hosted alternatives for sensitive internal operations using Go.
A quick overview of the tools, technologies, and methodologies I employ regularly.
I'm a polyglot developer. Here's a breakdown of the top programming languages I've used this year.
| Language | Time spent | Percentage |
|---|---|---|
| languages in total | ||