RESEARCH &
PUBLICATIONS

Real-world security research, vulnerabilities, and system-level discoveries across cloud, AI, and modern infrastructure. Exploring the boundaries of digital
defense through offensive analysis.

FEATURED RESEARCH

CVE-2025-x153
terminal

THE KUBERNETES BREAKOUT PROJECT

An in-depth analysis of container isolation bypasses in modern orchestration layers. Chains multiple misconfigurations to achieve host-level persistence.

ZERO-DAY ANALYSIS
terminal

AI MODEL POISONING VIA API

Research into adversarial machine learning, specifically targeting the data ingestion pipelines of top-tier LLM providers through unvalidated API endpoints.

INFRASTRUCTURE SEC
terminal

SECURE ENCLAVE DECRYPTION ATTACK

Exploiting timing vulnerabilities in hardware-level encryption modules. This research redefined the trust model for cloud-based secure enclaves.

All Research

AWS EKS Chain Attack

Escalating IAM permissions to gain cluster-admin via node-level vulnerabilities

AWS EKS Chain Attack

Escalating IAM permissions to gain cluster-admin via node-level vulnerabilities

AWS EKS Chain Attack

Escalating IAM permissions to gain cluster-admin via node-level vulnerabilities

AWS EKS Chain Attack

Escalating IAM permissions to gain cluster-admin via node-level vulnerabilities

TALKS &
PRESENTATIONS

 Regularly contributing to the global security community by sharing findings at major industry conferences and local meetups.

podcasts
Available for keynotes & panels

AWS K8S Chain Attack

CNCF Security Summit // Dec 2023

Cloud Shell Escape: A Global Vulnerability

BSides Budapest // Dec 2025

New Black-box AI Attack Techniques

BSides Vilnius // Dec 2023

RESEARCH APPROACH

BREAKING SYSTEMS

Identifying non-obvious entry points by challenging the fundamental assumptions of architectural design.

ANALYZING ARCHITECTURE

Mapping complex dependencies to find weaknesses where components interact with external systems.

CHAINING VULNERABILITIES

Moving beyond single-step bugs to create high-impact exploit chains that demonstrate business risk.

WANT TO GO DEEPER?

I turn complex security research into hands-on labs and practical guides. Bridge the gap between theory and exploitation.
EXPLORE BYTEBUZZ rocket_launch
hive