The Insider X Adversary-grade offensive security.
Independent operator running AI-assisted offensive workflows. Vulnerability research, CVE writeups, and select pentest engagements — built on a custom stack and a steady diet of bug hunting.
Arsenal
A custom offensive stack tuned for speed, coverage, and signal over noise.
Cybergodtools
Custom-built AI offensive framework. Automated recon, chained exploits, and operator-in-the-loop reporting.
77+ Offensive Tools
Burp Suite Pro, nmap, ffuf, sqlmap, nuclei, semgrep, slither — orchestrated end-to-end.
AI Exploit Chains
340+ attack patterns. LLM-assisted payload crafting, vuln triage, and writeup generation.
Web · API · Cloud
OWASP Top 10, GraphQL, AWS / GCP / Azure misconfig, container escape, IAM abuse.
Smart Contracts
Solidity, Rust, Move. Reentrancy, flash loan abuse, oracle manipulation, economic attacks.
Custom Recon
Asset discovery, attack-surface mapping, supply-chain shadow layer hunting.
Trophy Wall
Public disclosures and bug bounty trophies.
$ cat ./trophies.log
[ 0 ] entries
[ ! ] empty for now — hunting in progress
$ cat ./status
Active recon. Pipeline is hot.
First disclosures land here.
$ tail -f ./blog/writeups &
Inbox is open.
Pentest engagements, collaboration, or just to talk shop.
START A CONVERSATION →