- Breaking software so it doesn’t break people
- Vulnerability research, fuzzing & bug bounties
- Hardening systems from “works on my machine” to production-grade security
“Security is not a product — it’s a continuous fight.”
“Security is not a product — it’s a continuous fight.”
A basic Android background service that connects to a remote server, executes commands, and returns encrypted output. Disguised as a system update for educational fun. Not advanced, not stealthy. F…
SystemUpdate is an advanced Android background client for educational use. It connects to a remote server over AES-encrypted TCP, executes shell commands, records audio, captures photos, transfers …
This project is a stealth-focused Windows keylogger written in C++17, using native Windows API and WinHTTP for secure exfiltration of data to Telegram.
A deceptive Cloudflare-style verification page that collects detailed browser, system, and location data—including webcam snapshots—and sends it to a Telegram bot. Built with HTML, CSS, and JavaScr…