Think like an attacker,
defend like a pro.

Experiments, exploits, and mitigations across software, hardware, and LLMs—built to be run, not just read.

image of a security control room
image of accountants in action
image of students using technology (for edtech)
[digital project] image of a mobile device with an abstract ai developer tools interface, by itself
[background image] image of dispatch center (for a courier & delivery service)
image of accountant working at desk