I’ve been breaking systems and building tools since before I knew what infosec was. Still learning, still pushing, still having fun.
Offensive Security
Entrepreneur • Hacker • Blockchain Developer
I've got a decade of experience breaking high-value systems and emulating real-world threat actors. My work spans red team operations, offensive tooling, and blockchain security — from cloud-native apps and APIs to smart contracts and hardware wallets. I approach security with a hacker’s mindset and a builder’s hands.
Here are a few highlights from my full portfolio:
- KeySilence - silently unlocks macOS Keychain and extracts Chrome Safe Storage credentials using native macOS APIs with no security binary calls—bypassing typical EDR detection techniques.
- C2go - A very simple c2 in golang with matching cross platform agent. Made for quick remote testing during agent development.
- ETHstorageDump – A simple python tool to help dump memory slots from any deployed EVM compatible smart contracts..
- Vanity Walk – Ethereum vanity address generator in Go.
- MoneroDice-WalletGen - Monero Diceware seed generator
- Ethernaut Solutions Solutions Repo -Malicious smart contract code as solutions for the Ethernauts CTF.
- IRL-Protocol – NFT vault with offline proof-of-ownership.
- Bitwave – Decentralized web browsing. Winner of the 2015 Texas Bitcoin conference hackathon.
PGP Fingerprint: 2C99E3F231B774EF13ECD22704FEB6A8DDC4144D
Public Key: View Key
📫 Reach Out
DM me on LinkedIn or reach out and send me an ecrypted message PGP key. I'm always open to interesting problems in offensive security, red teaming, and blockchain.