I started programming from pure curiosity about how systems work — inspired by tech culture and the desire to understand what happens beneath the surface.
With no formal education, no courses, and no corporate background, I taught myself everything from open online resources. My journey progressed from experimentation to structured engineering.
Today I build production-grade systems for security research, hardware analysis, and automation. Every project is built with full system control — no black boxes.
Real-time global radiological intelligence platform. Aggregates 10,000+ sensors, detects anomalies in milliseconds, predicts fallout dispersion. Built with Rust + WebAssembly for zero-cost architecture at 100% free tier.
Autonomous WPA/WPA2 handshake capture device on ESP32-WROOM-32. FreeRTOS firmware with 4 core-pinned tasks, promiscuous-mode 802.11 sniffing, EAPOL parsing, PCAP writes to SD. OLED face UI, ~10 EUR BOM.
Production-ready Raspberry Pi 5 network appliance. Rust core (Tokio/Axum/pnet) for packet capture and nftables firewall. Modular plugin system for WireGuard VPN, Pi-hole DNS, Suricata IDS. React 18 dashboard with live WebSocket metrics.
Local desktop security analyzer for AI-generated web projects. 100% offline SAST/DAST scanning with severity scoring and AI fix prompt generation.
Enterprise-grade AI orchestration and monitoring system for BLACKBOXAI within VS Code. Real-time telemetry, command execution, and security sandboxing.
Attack path intelligence engine for offensive security teams. Ingests scan results, builds directed attack graphs, identifies realistic pivot opportunities.
Bluetooth Monitoring & Security Platform. ML-powered anomaly detection, real-time BLE traffic analysis, and comprehensive security auditing.
RF analysis platform for Flipper Zero. 15 advanced features: device fingerprinting, protocol detection, threat modeling. Lab-grade timing (<1μs), pure C.
Cross-platform password auditing tool for authorized security testing. PyQt6 GUI with modular backend supporting multiple attack vectors and hash types.
Flow-based network traffic analysis and anomaly investigation. Real-time packet inspection with flow-based anomaly detection for security operations.
Comprehensive static educational platform for developers. Covers backend, frontend, mobile, penetration testing, and AI-assisted web coding with progress tracking.
Open to interesting engineering problems, security research, and technical collaborations. Prefer async-first communication.