I build red-team tooling and AI systems β concise, testable, and production-quality code you can run in authorized lab environments. My focus blends offensive security research with applied AI: practical loaders and C2 prototypes for controlled red-team engagements, and AI agents and pipelines that accelerate threat emulation, operator workflows, and automation.
- Offensive research & tooling β loader prototypes, C2 frameworks, post-exploitation helpers, and test harnesses for red-team exercises and adversary emulation.
- AI for security β agentic workflows, tool-calling agents, RAG pipelines for threat intelligence, and automation to speed up purple/red team playbooks.
- Loader β prototype loader for research and lab use (instrumented, audited, and intended for controlled environments).
- C2 (Command & Control) β modular framework for simulation and emulation of adversary command and control flows in authorized tests.
- AI Tools β agent templates, RAG examples, and tool integration demos designed to speed up threat research and automate routine tasks.
All projects are developed for research, testing, and defensive purposes. Use only in environments where you have explicit authorization.
- Offensive tooling: reverse engineering, process injection concepts, Windows internals (research-focused)
- AI & LLMs: agents, tool calling, RAG, fine-tuning workflows, local/OSS models
- Languages & tooling: Delphi, C/C++, Python, Go, shell, WinAPI, debugging and reverse engineering toolchains
- Dev practices: reproducible examples, unit/integration tests, CI for security experiments