close
OFFENSIVE SECURITY RESEARCHER

The Insider X Adversary-grade offensive security.

Independent operator running AI-assisted offensive workflows. Vulnerability research, CVE writeups, and select pentest engagements — built on a custom stack and a steady diet of bug hunting.

CVE HUNTING RED TEAMING AI EXPLOIT CHAINS WEB / API / CLOUD
// LOADOUT

Arsenal

A custom offensive stack tuned for speed, coverage, and signal over noise.

PRIMARY

Cybergodtools

Custom-built AI offensive framework. Automated recon, chained exploits, and operator-in-the-loop reporting.

TOOLS

77+ Offensive Tools

Burp Suite Pro, nmap, ffuf, sqlmap, nuclei, semgrep, slither — orchestrated end-to-end.

AI

AI Exploit Chains

340+ attack patterns. LLM-assisted payload crafting, vuln triage, and writeup generation.

SURFACE

Web · API · Cloud

OWASP Top 10, GraphQL, AWS / GCP / Azure misconfig, container escape, IAM abuse.

CHAIN

Smart Contracts

Solidity, Rust, Move. Reentrancy, flash loan abuse, oracle manipulation, economic attacks.

RECON

Custom Recon

Asset discovery, attack-surface mapping, supply-chain shadow layer hunting.

// CONFIRMED KILLS

Trophy Wall

Public disclosures and bug bounty trophies.

trophy-wall

$ cat ./trophies.log

[ 0 ] entries

[ ! ] empty for now — hunting in progress

$ cat ./status

Active recon. Pipeline is hot.

First disclosures land here.

$ tail -f ./blog/writeups &

// OPEN CHANNEL

Inbox is open.

Pentest engagements, collaboration, or just to talk shop.

START A CONVERSATION →