Real-world security research, vulnerabilities, and system-level discoveries across cloud, AI, and modern infrastructure. Exploring the boundaries of digital
defense through offensive analysis.
An in-depth analysis of container isolation bypasses in modern orchestration layers. Chains multiple misconfigurations to achieve host-level persistence.
Research into adversarial machine learning, specifically targeting the data ingestion pipelines of top-tier LLM providers through unvalidated API endpoints.
Exploiting timing vulnerabilities in hardware-level encryption modules. This research redefined the trust model for cloud-based secure enclaves.
Escalating IAM permissions to gain cluster-admin via node-level vulnerabilities
Escalating IAM permissions to gain cluster-admin via node-level vulnerabilities
Escalating IAM permissions to gain cluster-admin via node-level vulnerabilities
Escalating IAM permissions to gain cluster-admin via node-level vulnerabilities
Regularly contributing to the global security community by sharing findings at major industry conferences and local meetups.
Identifying non-obvious entry points by challenging the fundamental assumptions of architectural design.
Mapping complex dependencies to find weaknesses where components interact with external systems.
Moving beyond single-step bugs to create high-impact exploit chains that demonstrate business risk.