APIs: Friend or Foe
Exploring the dual nature of APIs - from seamless data exchange to potential weaponization in cybersecurity.
Read more →👋 Cybersecurity engineer & AI builder — I build systems end-to-end: from lab-tested red-team simulations and AI pipelines to integrated automation that moves product and ops forward.
I design tools that find real gaps, automate repetitive work with AI, and produce developer-ready fixes that ship. Practical security engineered for production.
Lab-tested simulations • AI pipelines • Production automation
Advanced reconnaissance, endpoint intelligence, and auth testing for modern applications.
LLM-powered pipelines for lead qualification, security triage, and operational efficiency.
Safe adversary simulations and defensive malware analysis for detection tuning.
Security insights, technical notes, and learning journeys
Exploring the dual nature of APIs - from seamless data exchange to potential weaponization in cybersecurity.
Read more →An introduction to my blogging journey and what to expect from this space.
Read more →Exploring current trends and developments in the technology landscape.
Read more →Comprehensive skills matrix with proven proficiency levels
Real-world security engineering and AI automation solutions
Production-grade API reconnaissance toolkit that locates and catalogs dynamic API surfaces (REST, GraphQL, OpenAPI). Combines passive discovery with rate-limit-aware active scanning.
Consolidated API inventory reduced undocumented surface area and prioritized fixes for production teams.
Consent-first phishing simulation & awareness platform with template deployment, campaign metrics, and safe credential-handling safeguards.
Improved detection and staff awareness, reducing phishing click-through rates with targeted training.
End-to-end Zapier flows integrated with AI prompt templates for automatic lead qualification, CRM enrichment, and follow-up workflows.
90% reduction in lead triage time and increased conversion-ready leads for sales teams.
Isolated analysis lab for triage, reversing, and telemetry collection with safe emulation frameworks for EDR tuning.
Enabled blue teams to detect attacker TTPs faster and tune EDR with high-quality signals.
Validated expertise and continuous learning
Advanced red team operations and adversarial simulation training covering comprehensive attack techniques and defense evasion.
Comprehensive offensive security training covering web app testing, network penetration, and social engineering.
Advanced API security testing methodologies, REST/GraphQL security, and automated API reconnaissance techniques.
All testing, emulation, and research is performed under strict authorization and within scoped environments. I require written Rules of Engagement (RoE) and provide redacted artifacts for public publishing. Proof-of-concept materials are redacted for safety before any sharing.