Recon pipeline
A opinionated bash + Python pipeline for scoped recon — less chaos, more signal, fewer accidental port scans of the wrong continent.
I break into systems (with permission), build tools that catch bad guys, and occasionally write code that compiles on the first try.
// origin story
I grew up pulling things apart to see how they tick — clocks, radios, and eventually software stacks that really did not want to be pulled apart. That habit turned into a career in cybersecurity: find the crack, understand it, help teams fix it before someone less friendly does.
I care about clear writeups, tools that actually ship, and teaching others to read a trace without losing their soul. When I'm not in a shell, I'm probably brewing another pour-over or losing at a board game with deceptive mechanics.
// the toolbelt
// side quests & main missions
A opinionated bash + Python pipeline for scoped recon — less chaos, more signal, fewer accidental port scans of the wrong continent.
Mini app + notes on alg confusion and kid abuse — built so future me remembers why 3 a.m. debugging is a bad life choice.
Snippets and one-liners I've collected from war rooms, flights with no Wi‑Fi, and that one challenge that ate a weekend.
Query pack + cheat sheet for turning noisy SIEM exports into "aha" moments without summoning a vendor SE.
Throwing structured chaos at REST edges — rate limits, weird content types, and parameters that should not exist but do.
Disk and memory triage notes from CTFs — mostly so I stop re-learning file carving every six months.
// war stories
// achievement unlocked
// the main storyline
Building safer systems, breaking them first, and writing tickets I'd actually want to receive. Focus on application security, tooling, and shipping without secrets in plain text.
Graduated from triage and alerts to full assessments, report writing that humans enjoy, and proof-of-concepts that actually reproduce.
Foundations in systems, networks, and the stubborn belief that every bug is a puzzle with a solution.
Started with "what if I ran this in a VM?" and never really stopped asking unsafe questions in safe environments.