Penetration testing · Exploit development · Security tooling · Full-stack engineering
I'm a security-focused IT professional who breaks things for a living — then helps build them back stronger. With deep experience in penetration testing, exploit development, and offensive security research, I operate at the intersection of hacking and engineering.
I architect and automate complex systems, build API proxies, create security testing infrastructure, and develop custom exploits. My approach: if it can be automated, it should be. If it can be broken, I'll find how.
When I'm not finding vulnerabilities, I'm building tools that help others test their defenses — from file download testing platforms to DNS exfiltration demos.
DNS is often overlooked as a data channel. Attackers can encode stolen data into DNS queries that pass through firewalls unnoticed. This interactive demo visualizes how DNS-based data exfiltration and covert communication works — entirely client-side, no actual data leaves your browser.
Data is encoded (hex/base32/base64) and split into chunks that fit within DNS label limits (63 chars). Each chunk becomes a subdomain of the attacker-controlled domain. Standard DNS recursion delivers the encoded data to the attacker's nameserver logs.
DNS traffic (UDP/53) is almost always permitted outbound. Most firewalls and proxies don't inspect DNS payload content beyond basic formatting. The queries look like normal subdomain lookups.
Monitor for unusually long subdomain labels, high entropy in domain names, abnormal query volume to a single domain, and TXT record queries with large responses. Passive DNS analytics and ML-based detectors can flag these patterns.
Platform to test file download security mechanisms — network-based blocking, inline AV scanning, HPKP pinning, transport obfuscation, and more.
Client-side security & developer tools — date/timestamp converters, encoding tools, diff viewer, URL en/decoding. Like CyberChef, but focused.
Tools and research around DNS-based data exfiltration, covert channels, and C2 communication. Detection strategies and proof-of-concept implementations.
Original vulnerability research and exploit development. Responsible disclosure and security advisory work.