Low-level systems · Exploit development · Cognitive architectures
Intersection of kernel development, offensive security, and behavioral modeling.
Strictly white-hat: ethical research, red team simulations, defensive hardening. No unauthorized access or black-hat activity.
- Ring-0 development & kernel internals
- Exploit research (user/kernel mode)
- Evasion & breaching defenses
- Direct Memory Access (DMA) attacks
- CAN bus & automotive protocol reversing
- Symbolic reasoning in large models
Languages & Tools
- Offensive Security: OSCP, OSWE, OSEP, OSCE³ / OSEE, GXPN
- Red Team: CRTOP (ZeroPoint), MRT (MCSI)
- Other: PMP, BCBA-D
(Private repos dominate due to sensitivity; public ones below)
- Tychon AI - Custom 754B-scale symbolic reasoning model (inference optimizations)
- Kernel DMA tooling - Ring-0 physical memory manipulation research
- Automotive security - CAN-bus vulnerability analysis & tooling
Full portfolio shared selectively under NDA/research agreements.
• Telegram - @kittywp (slow response)
• Threema - 5AVDS52W (high security)
• Jami - 0m2 (peer-to-peer)